Search (advanced search) | ||||
Use this Search form before posting, asking or make a new thread.
|
06-27-2015, 10:23 AM
Post: #21
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
When I downloaded exploit scanner from here...
http://wordpress.org/extend/plugins/exploit-scanner/ and scan with virus total ... said Bkav VEX6466.Webshell Is it some sort of backdoor?
World's Top Sales Training: SPIN Selling Conversations (Digital Course) - Free Book for You in Post #3
http://bestblackhatforum.com/Thread-GB-R...pid2484145 |
|||
06-30-2015, 05:16 AM
Post: #22
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
wow..i learn something new here..thanks op
|
|||
07-18-2015, 03:19 PM
Post: #23
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
nearly all my plugin have malicious code -_-
should i delete them all ? |
|||
07-18-2015, 09:57 PM
(This post was last modified: 07-18-2015 10:02 PM by jethroucc.)
Post: #24
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Pl...
(07-18-2015 03:19 PM)tajin Wrote: nearly all my plugin have malicious code -_-Yes, highly suggested.. Odd question really. To add to the OP's post, another great tool to scan your wordpress plugins/themes is GOTMLS Exploit Scanner. Very similar to the one listed already, this one has more active updates and is easy to update, and has a LOT more definitions and (in my opinion) better detection. But it's HOW you detect this shit - Most malware in these plugins and themes used encryption (mostly base_64) to hide themselves.. Essentially, if the other scanning plugin doesn't have the known viral definition, it won't pick something up. This one not only can detect more known, but also lets you check "potentially compromised" scripts by looking for some key things that are may be malware (eval(base64_decode or <?php echo stripslashes($wpl_header_desc); ?> uses) and lets you exmaine them a little closer. BUT - some scripts use these kkind of functions for normal, legit purposes. So how to tell? So our script finds something that may be suspicious. It finds a line that contains the following code: Code: eval (gzinflate( base64 _decode("NdLJlmNQAADQX8muqo6FIKZTXV0HEUKixCybPsIzBOGZHu/ruzf9B3dxd9+/f333Zb8DS9Ls3gtcvfImmcD7IxkBd/ That's a lot of decoding for a script to do isn't it? Lines like this need to be looked at closer. Some decoding work (well, a lot to be honest. no one said this was gonna be easy) reveals: Code: add_action('wp_head', 'my_wpfunww7x'); Decoding these scripts is the tough part here. Takes some decent understanding of PHP, and how to obfuscate/deobfuscate, potentially using several different types of encryption, and possibly having to follow a path of different PHP scripts being used together. If memory serves me right, this encoded statement was itself, encoded, inserted into another script, and then pointed to by yet another.. Thankfully, it can sometimes be easy to tell if a script is legit or malicious. Sometimes encryption is minimal enough, or a more simple method is used, or not at all. Don't assume that just because a statement is short, however, that it's safe. You'd be surprised what you can fit into a piece of code 5% this size. Also, your friend google can help you here again. You can quite literally pop a string into google (surrounded by "quotes"), and it will likely return results, which may point to a script being clean or not. While it's possible to explain the steps involved in the encoding/decoding process, it would have to be it's own thread at the very least, and would take hours to write out something cohesive enough to call a "guide". Rather, I'll suggest hitting google. "encode/decode" and "obfuscate/deobfuscate" are gonna be helpful keywords. And frankly, i'm still not the best at it. The script above was a "practice" script for m years ago, but I can't find the link to the site that explained the whole process.. Will post it later if I can. One last thing - If you are unsure (and i mean ANY doubt exists in your mind) that a script isn't clean.. DO NOT USE IT. "Well couldn't i just put it on a shared host?". Yes, you d****. You could, but don't be part of a giant sub-section of web users that contributes to free hosting being shut down across the world. The reason free hosts nowadays are such shit is because of crap like this and webshells. You can scan the PHP files individually (or search i should say?) for things like "base64 _decode" or "gzinflate". Get tricky with it, try "edoced_46esab" and so on. Too much work (slacker)? Run it locally, using a webserver (like WAMP for windows users, XAMPP for linux, or, for people uncomfortable with setting up even those two, AAMPS), which will also let you monitor the actual traffic and inbound/outbound connections being utilized by PHP and HTTP queries. If there is a real need or desire for a guide to be written on the subject in detail, and eough people express an interest, I may write one up. Or maybe one of our amazing crackers (and experts compared to myself) programmers/crackers could write one out, I would be happy to help with such a project to say the least. Be safe, don't use scripts from MOST sites giving them away free (what is the benefit to the site exactly?), and always keep an eye out for suspicious activity anywhere you may have used one or part of one at any time. And don't be lazy. That's why shit like this has a place to happen in the first place. Rep's always appreciated, contributing takes time! Support your contributors like they support you! |
|||
07-19-2015, 10:58 AM
Post: #25
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
Everyone should get the following to monitor their Wordpress installation:
1. Wordfence 2. Bruteprotect 3. Web host with additional file/hack monitoring If you download shares from blackhat forums or anywhere else, you have to check for traffic stealing malware, or malware that loads ads, or uses your hosting to launch attacks on other sites. Ask Wordfence or Securi to check your files for all types of malware which are hidden in .png files, cURL and other scripts. Last year I downloaded MyMail from a user here called Jezuz and the next day my WP stats showed that I lost a lot of traffic. Ever since, I buy my own plugins and themes. Blackhatters use these forums to distribute their malware code and if one site on a server is infected ALL SITES ON THAT SERVER ARE INFECTED AND ARE USED BY THE THIEVES. Anytime you shares, especially those that state "Always Updated" then be leary of the bas_urd sharing. You have been warned. |
|||
07-22-2015, 12:35 AM
Post: #26
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
Very Useful Article thank you for sharing it with us it is such a useful article nowadays!
|
|||
07-24-2015, 01:30 PM
Post: #27
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
Thanks intrepid for the tip. good plugins i tried wordfence
“There is no secret ingredient” ☺
|
|||
07-24-2015, 06:37 PM
Post: #28
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
Great thread, thank a lot
|
|||
07-24-2015, 08:18 PM
(This post was last modified: 07-24-2015 08:19 PM by sfenix.)
Post: #29
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins
useful information, thanks
rep added |
|||
07-25-2015, 09:22 AM
Post: #30
|
|||
|
|||
RE: Must Read: How to detect Malicious code in nulled or Free WordPress Themes and Plugins | |||