[phpBB Debug] PHP Warning: in file [ROOT]/feed.php on line 173: Cannot modify header information - headers already sent by (output started at [ROOT]/feed.php:1)
[phpBB Debug] PHP Warning: in file [ROOT]/feed.php on line 174: Cannot modify header information - headers already sent by (output started at [ROOT]/feed.php:1)
[phpBB Debug] PHP Warning: in file [ROOT]/feed.php on line 180: Cannot modify header information - headers already sent by (output started at [ROOT]/feed.php:1)
IntegraMOD Home of phpBB Integrated Modifications 2006-06-24T07:54:02-07:00 http://www.integramod.com/forum/feed.php?f=12&t=736 2006-06-24T07:54:02-07:00 2006-06-24T07:54:02-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=10111#p10111 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]> Statistics: Posted Author: itunes66 — Sat Jun 24, 2006 7:54 am


]]>
2006-06-24T07:06:24-07:00 2006-06-24T07:06:24-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=10104#p10104 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]>
"found it";p="5930" wrote:
We are looking into it
:mrgreen:
Any developments? I managed to delete the file and it has not reappeared for two weeks, but I am naturally concerned that security has already been compromised.

Statistics: Posted Author: Dr. Bantham — Sat Jun 24, 2006 7:06 am


]]>
2006-06-12T22:13:50-07:00 2006-06-12T22:13:50-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9326#p9326 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]> Statistics: Posted Author: grizzly_cs — Mon Jun 12, 2006 10:13 pm


]]>
2006-06-12T14:37:03-07:00 2006-06-12T14:37:03-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9308#p9308 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]> Statistics: Posted Author: Dr. Bantham — Mon Jun 12, 2006 2:37 pm


]]>
2006-06-10T02:58:18-07:00 2006-06-10T02:58:18-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9122#p9122 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]> not change the timestamp. I am super-paranoid at this point. Should I be changing my passwords for IntegraMOD and/or my server host? Is this a destructive trojan or is it fishing for sensitive information. Help!

Statistics: Posted Author: Dr. Bantham — Sat Jun 10, 2006 2:58 am


]]>
2006-06-09T17:17:22-07:00 2006-06-09T17:17:22-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9106#p9106 <![CDATA[Backdoor Hack found in "Backup" folder - musa.php]]>
"IW4";p="9100" wrote:
Y'know, I had this on mine, as well. Out of curiosity, jwernerny, who's your web host?


I am with WB-Hosting now. I did read something that suggested it could be cross loaded from another site on a shared hosts.

Statistics: Posted Author: jwernerny — Fri Jun 09, 2006 5:17 pm


]]>
2006-06-09T16:58:52-07:00 2006-06-09T16:58:52-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9105#p9105 <![CDATA[Backdoor Hack found in "Backup" folder - musa.php]]>
Link: http://hometown.aol.com/yarivgiladi/musa.php

This is an other stupid "BackDoor Shell Exploit" :(

Statistics: Posted Author: ArangeL — Fri Jun 09, 2006 4:58 pm


]]>
2006-06-09T14:15:59-07:00 2006-06-09T14:15:59-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=9100#p9100 <![CDATA[Backdoor Hack found in "Backup" folder - musa.php]]> Statistics: Posted Author: IW4 — Fri Jun 09, 2006 2:15 pm


]]>
2006-05-15T01:41:09-07:00 2006-05-15T01:41:09-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=5930#p5930 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]>
We are looking into it

:mrgreen:

Statistics: Posted Author: found it — Mon May 15, 2006 1:41 am


]]>
2006-05-14T18:50:31-07:00 2006-05-14T18:50:31-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=5905#p5905 <![CDATA[Re: Backdoor Hack found in "Backup" folder - musa.]]>
c99shell - file- manager through www-brouzer, "zatochenyy" for the breaking.
* you can free of charge skachat' last version on home page of the product:

* the special features:

* + control of local and remote (ftp, samba) faylami/papkami, the sorting

* injection running off it is file and the folders

* (predvoritel'no it upakovyvayetsya/raspakovyvayetsya through tar)

* the moved search (it is possible is inside file)

* modify- Time and access- Time in is file they do not change with the editing (for off. cm #$$filestealth>)

* + the fulfillment of arbitrary PHP- code * + the coder of the data through md5, unix-md5, sha1, crc32, base64 * + the rapid local analysis of safety OS

* + rapid ftp- scanning to bonds login;.login from /.etch/passshd (it usually gives access to 1/100 akkauntov)

* paginal conclusion, sorting, the group operations above BD/tablitsami, control of processes of SQL)

* + script "loves" include: automatically searches for variables with the descriptors and puts them in the references (optsial'no) also it is possible to change $surl (base reference) both through the configuration (forcedly) and through cookie "c99sh_.surl", it goes the auto-record of the value of $set_surl in cookie "set_.surl"

* + the possibility "to zabindit'" to /.bin/basyu to the specific port with the arbitrary password, or to make back connect (it is produced testing soyedeneniya, and they are derived the parameters for starting of NetCat).

* + the possibility of the rapid self-removal of the script * + the avtomatizirovanaya sending of communications about the omissions and the wishes to the author (through mail()) * * is given far from complete list of possibilities.


* * the expected changes: * ~ development sql- manager * ~ the addition of the missing expansions it is file

* * ~ - ~ write about all naydenykh omissions, desired changes and modifications (even about the insignificant!) in ICQ UIN #'shch'shchshchshch or through the division "feedback", will be examined all proposals and wishes.

Statistics: Posted Author: grizzly_cs — Sun May 14, 2006 6:50 pm


]]>
2006-05-14T17:47:15-07:00 2006-05-14T17:47:15-07:00 http://www.integramod.com/forum/viewtopic.php?t=736&p=5894#p5894 <![CDATA[Backdoor Hack found in "Backup" folder - musa.php]]>
I found something rather disturbing in my backup directory of my php site today. It was a php script that allows anyone access to the backdoor of my site. It is called "musa.php". I did a search of google and of this Integramod2, and didn't see it mentioned anywhere. I am not sure how to block it other then to disable the backups (which I don't want to do, but would rather do then have an unsecure site).

BTW, the only way to remove it seems to be to use it to remove itself.

Anyway, here is the header of the code for the hack with the hope someone can block it.

- John

 <?php/*********************************************************************************************************                    c99shell.php v.1.0 pre-release build #13*                            Freeware license.*                                ÃƒÆ’‚ © CCTeaM.*  c99shell - файл-менеджер через www-броузер, "заточеный" для взлома.*  Вы можете бесплатно скачать последнюю версию на домашней страничке продукта]http://ccteam.ru*[/url]  ICQ UIN #: 656555**  Особенности:*  + управление локальными и удаленными (ftp, samba) файлами/папками, сортировка*    закачивание скачивание файлов и папок*    (предворительно упаковывается/распаковывается через tar)*    продвинутый поиск (возможен внутри файлов)*    modify-time и access-time у файлов не меняются при редактировании (для откл. см $filestealth)*  + выполнение произвольного PHP-кода*  + кодировщик данных через md5, unix-md5, sha1, crc32, base64*  + быстрый локальный анализ безопасности ОС*  + быстрое ftp-сканирование на связки login;login из /etc/passwd (обычно дает доступ к 1/100 аккаунтов)*    постраничный вывод, сортировка, групповые операции над БД/таблицами, управление процессами SQL)*  + скрипт "любит" include: автоматически ищет переменные с дескрипторами и вставляет их в ссылки (опциально)      также можно изменить $surl (базовая ссылка) как через конфигурацию (принудительно) так и через cookie "c99sh_surl",      идет авто-запись значения $set_surl в cookie "set_surl"*  + возможность "забиндить" /bin/bash на определенный порт с произвольным паролем,*    или сделать back connect (производится тестирование соеденения, и выводятся параметры для запуска NetCat).*  + возможность быстрого само-удаления скрипта*  + автоматизированая отправка сообщений о недоработках и пожеланиях автору (через mail())**    Приведен далеко не полный список возможностей.**   Ожидаемые изменения:*  ~ Развитие sql-менеджера*  ~ Добавление недостающих расширений файлов**  ~-~ Пишите обо всех найденых недоработках, желаемых изменениях и доработках (даже о самых незначительных!)        в ICQ UIN #656555 либо через раздел "feedback", будут рассмотрены все предложения и пожелания.**  Last modify: 29.07.2005**  ÃƒÆ’‚ © Captain Crunch Security TeaM. Coded by tristram********************************************************************************************************/    

Statistics: Posted Author: jwernerny — Sun May 14, 2006 5:47 pm


]]>