News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Greg Freeman:
How to Tell if Your PHP Site has been Hacked or Compromised
March 05, 2013 @ 12:54:14

In this recent post to his site Greg Freeman share some things to check for when you think your PHP site (any kind, even something like WordPress) might have been compromised.

A friend of mine recently had their site compromised, they were running an older version of IP.Board that is vulnerable to a local file inclusion vulnerability. This post won't be about IP.Board or any specific php code, it will show you how to locate potential malicious php code hosted on your servers and how to fix it. Finally I will give a brief explanation on what attacker's are uploading to compromised sites.

Among the things he recommends are tips like:

  • Check your Access Logs
  • Finding Recently Modified PHP Files
  • Finding obfuscated code
  • Always search your writable upload directories for executable code
  • Check .htaccess Files if you use Apache

You can find the descriptions for each of these (and some others to watch out for) in the full post.

0 comments voice your opinion now!
hack compromise checklist malicious code


blog comments powered by Disqus

Similar Posts

Brian Moon's Blog: PHP generated code tricks

Ilia Alshanetsky's Blog: Performance Analysis of isset() vs array_key_exists()

PHPClasses.org: Lately in PHP Podcast #46 - "Is the Hack Language Going to Replace PHP?"

NetTuts.com: Refactoring Legacy Code: Part 4 - Our First Unit Tests

Designer Daily: 8 useful recipes to improve your WordPress theme


Community Events





Don't see your event here?
Let us know!


symfony api community laravel interview release series list library deployment package install tips language opinion update framework podcast zendserver introduction

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework