eswrite-wp
Forum Replies Created
-
Forum: Fixing WordPress
In reply to: I did a restore but i got a problemProblem Solved thank you
Mind sharing with us how you solved the issue?
Forum: Fixing WordPress
In reply to: Site Hacked HelpOne bit of warning on that last link (scanner): when I used it on my site, it came back clean, yet subsequent manual inspection uncovered several infections. Does anyone know of alternative scanners?
Forum: Fixing WordPress
In reply to: Site Hacked HelpIn using the wordpress editor, how can I delete the coding as described above?
Depending on what file the coding resides in, you may not be able to access and/or edit it in the wordpress editor. It’s probably pretty safe to say that a hacker will purposely place the code in files that aren’t accessible through the editor.
Get a FTP client application, log on to your server, download your entire WP installation folder. Then do a search for the offending code or signs of it. In some cases you will be able to do do a grep or grep-like search through your entire folder structure for “known” malicious code and flag the files that contain them. In other cases you will painfully need to manually inspect your directories and files.
The brute force method of replacing all files from a clean WP install is good for the bulk of the core files, but in some cases (wp-config.php, wp-contents/themes, actual content you’ve added etc.) you will need to sift through to figure out what belongs and what doesn’t. The hardest thing for me was plugins I’ve added (under the wp-content directory) because being unfamiliar with how file names and contents are supposed to look, it is difficult to determine what to flag as ‘malicious.’
Good luck, Google a lot, and be patient. I’m almost thru with my cleanup, and I still wonder whether I’ve caught everything.
Forum: Fixing WordPress
In reply to: Post-hack database inspection and cleanupI know, I’m boring you all, but for the 1 person who is following this exciting saga with bated breath…
I think I’m in a lot better shape than I thought. Late night led to some faulty conclusions. It turns out the two funny looking databases I see are not suspicious in name at least. The first is from an aborted WP install back in 2009, and contains only default WP stuff. The second is in fact my current database. I’m in the process of using my ISPs web-based tools to snoop through it and see if I find anything suspicious. I did go through and through WordPress’ admin interface remove every user except me. Then I went back to the MySQL/phpMyAdmin interface and verified no rogue/hidden users in the actual database. That’s one less thing to worry about, but my blog users won’t be happy that they have to re-initiate their subscriptions. Oh, well. It was the only way I could think of id’ing a rogue user.
Forum: Fixing WordPress
In reply to: Post-hack database inspection and cleanupMore about the WP database than I ever wanted to know… but once I figure out how to examine the database, it should let me know what’s ‘odd’ and what isn’t.
Forum: Fixing WordPress
In reply to: Recovering from white screen wp-admin pageThough I’m still figuring out how to clean-up my database for which I have no recent/useful backup, I thought I’d jot down the “anatomy of the hack” as far as I’ve been able to figure it out.
- I found and removed a FTP user name I had never created (user name similar to mine, but with some gibberish text after an under-score). According to my ISP, this FTP user had never accessed my site, so assuming the hacker didn’t clean his tracks (simplest assumption), it appears that’s one backdoor for future use.
- I found and removed a recently added (at or about the time my site went to the white page) is_human plugin folder. I used to have this plugin, but removed it some time ago. This is pretty much the only alteration I can detect via recent time stamps.
- I found and replaced a base64 infected wp-config.php file. Interestingly, it’s timestamp was not recent at all. As soon as I cleaned this file, my site no longer showed the white page and was up and running.
- I found another base64 infected file, this time in a theme I wasn’t using. I removed all themes except for the default and my own customized theme. For the latter, I scanned each file, line by line (painful!) to ensure no monkey business. This is tough because though I’ve been editing these files for some time, I derived them from another theme, and hence I’m not quite sure what does and doesn’t belong.
- I found nested wp-admin, wp-includes and wp-content directories (i.e., wp-admin had a wp-admin sub-directory, etc.) I removed all these.
- For good measure, I replaced all directories/files that wouldn’t erase content data with what comes in a clean WP 3.3.1 install.
- Finally, on my ISP’s MySQL control panel, I found 3 databases, at least 2 of which appear to be copies of each other and have unusual naming. In the process of figuring out how best to deal with that, as I linked above.
This is really a very painful and paranoia-filled exercise. Have I looked at everything, cleaned-up everything, changed all that I need to change? Baring a full re-install with complete database loss, I’m beginning to think I will never know.
Forum: Fixing WordPress
In reply to: Post-hack database inspection and cleanupHere’s a related thread that seems to be dealing with something similar, but without the detail of how to examine/determine whether the database I’m looking at is hacked.
EDIT: Here’s a more useful thread with some nice suggestions I will now follow…
Forum: Fixing WordPress
In reply to: Site Hacked HelpThe short answer is: download your core files to your PC, then do a search for that string (or part of it) to locate the infected file(s). Remove the offending code, then replace the affected file(s) in your server.
The long answer is that you need to do a full inspection and cleanup of your wordpress core files and database. I’m trying to sort this out myself. Lots of links and suggestions out there, but I’ll warn you even for this very technically minded person, it gets confusing and unclear real fast. And all the people helping here seem to assume it should all be so obvious. I’m sure it is, but it takes tenacity and patience.
Here are 3 threads with my travails…
Thread 1
Thread 2
Thread 3Forum: Fixing WordPress
In reply to: Nested wp-content folder?There should be no nested folders.
Thanks, they’re gone now. They looked pretty clean/benign, though I didn’t go down into every sub-folder. Timestamps dated back to 2008, but I’m beginning to think that means nothing. Is this nesting another hacker’s trick?
Forum: Fixing WordPress
In reply to: Recovering from white screen wp-admin pageThe hacker has added it.
No kidding. But how? I don’t expect you to figure it out for me, but in all those links posted above, I see nothing that helps me figure it out so I can plug the hole. I did see a FTP user that I didn’t add, but the access log showed no activity, and none of the modified files had time stamps beyond December of last year. The logs are useless. So?
Forum: Fixing WordPress
In reply to: Nested wp-content folder?… and a wp-admin folder inside the wp-admin folder.
Forum: Fixing WordPress
In reply to: Nested wp-content folder?BTW, I also found a nested wp-includes folder inside the — you guessed it — wp-includes folder. I removed this folder (tons of files I didn’t have time to review) and my site is functioning properly.
Forum: Fixing WordPress
In reply to: Recovering from white screen wp-admin pageOne other link:
http://www.rvoodoo.com/projects/the-dreaded-base64-wordpress-hack-and-other-hacks-too/
Thing I can’t find anywhere is, how does this base64 stuff get on there in the first place?
Forum: Fixing WordPress
In reply to: Recovering from white screen wp-admin pageI’m up and running now after cleaning that bit, but I’ll need to run through the rest of the gauntlet now.
Forum: Fixing WordPress
In reply to: Recovering from white screen wp-admin pageOoops… spoke too soon. Just found evidence of the “eval… base64” hack in my wp-config.php file. More to do….