On 24 Sep 2006, at 04:00, Gadi Evron wrote:
[...]
With thousands of sites on every server and virtual machines everywhere, all it takes is one insecure web application such as xxxBB or PHPxx for the server to be remote accessed, and for a remote connect-back shell to
be installed. The rest is history.

Hence why I'm rather partial to the ROT13 of a certain such application: cucOO.

[...]
We all (well, never say all, every, never, ever, etc.), many of us face
this. What solutions have you found?

Some solutions I heard used, or utilized:
1. Remote scanning of web servers.

Well, I *did* at one point have a script that looked for files with any of a list of MD5 sums and chmod them 000 if it found one. Grepping for "Matt Wright" in Perl scripts and chmodding them is also not a bad idea :)

2. Much stronger security enforcement on servers.

Actually, even bothering to use Unix user accounts rather than running everything under the Apache uid (or sometimes nobody or root!) would be a fine start.

3. "Quietly patching" user web applications without permission.

I would like to plead the Fifth at this point.

4. JGH - Just getting hacked.

This seems to be a popular enough technique, as long as the money still keeps rolling in, but not one I particularly subscribe to because the bad reputation gets round after a while.

What have you encountered? What have you done, sorry, heard of someone
else do, to combat this very difficult problem on your networks?

Hacked accounts aren't evenly distributed over the customer base. A judiciously-applied account suspension or bollocking goes a long way.


Reply via email to