网页中的未知代码

发布于 2024-10-20 06:24:32 字数 182 浏览 4 评论 0原文

我在我们的实时网页中发现未知代码。 我们还注意到我们共享网络托管空间上托管的几个网站被神秘地删除了。

我们发现的未知代码以图像格式显示在下面。请告诉我们这是什么类型的代码以及我们如何避免这些代码被添加到我们的网页中。在此处输入图像描述

Im finding unknown code in our live webpages.
We also noticed couple of websites hosted on our shared web hosting space are mysteriously getting deleted.

The unknown code we found is displayedd below in image format. Kindly update us what kind of code is this and how can we avoid these code from getting added to our webpages.enter image description here

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(3

紅太極 2024-10-27 06:24:32

是的,它看起来像一个与这个相同的后门。我认为这是一篇有趣的文章,它详细介绍了解码过程,并介绍了如何清理系统。

Yep it looks like a backdoor identical to this one. I think thats an interesting post, it goes over the process of decoding it and bit on how to clean up your system.

温柔戏命师 2024-10-27 06:24:32

您的服务器上的其他地方可能存在相同或相似的代码/特洛伊木马/病毒,甚至在您的用户帐户之外也是如此。请参阅下面的建议#3。

可疑看起来像一个RAT,因为它通过调用执行解码后的base64_decode
eval(base64_decode(“whole_bunch_of_obfuscated_stuff”));
由于您没有将该文件放在那里,因此请立即压缩它!

进一步建议:

  1. 记下该病毒的创建日期/时间;它将帮助您检测您何时/如何被感染。
  2. 压缩文件而不是删除它,将其从服务器上取下,然后将其发送到 [电子邮件受保护] 进行 RAT 解剖。
  3. 搜索系统上的其他 RAT:在目录树的最高位置执行 [~] grep -r "base64_decode" . 。有关更多详细信息,请参阅下面提到的文章。
  4. 请联系您的提供商。在某些条件下,此类远程控制工具可以跨用户帐户。

thegothicparty.com 上有一篇专门介绍 RAT 和服务器 RAT 感染的文章。

您可以在这里阅读:
http://thegothicparty.com/dev/article/server-side-virus-老鼠/

You are likely to have the same or similar code/trojan/virus duplicated elsewhere on your server, even outside of your user account. See advice #3 below.

This is suspiciously looking like a RAT, since it executes the decoded base64_decode by invoking
eval(base64_decode( "whole_bunch_of_obfuscated_stuff"));
As you did not put that file there, zip it immediately!

Further advice:

  1. Note the creation date/time of this virus ; it will help you detect when/how you got infected.
  2. ZIP the file rather than deleting it, take it off the server, and send it to [email protected] for a RAT dissection.
  3. Search for other RAT on your system: execute a [~] grep -r "base64_decode" . as high up the directory tree as you can. See the article mentioned below for more details.
  4. Contact your provider. Under certain conditions, such a remote control tool can cross user accounts.

An article dedicated to RAT and Server RAT Infection is located on thegothicparty.com.

You can read it here:
http://thegothicparty.com/dev/article/server-side-virus-rat/

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文