[nycphp-talk] I've been hit with an eval(base64_decode("....")) injection attack
David Mintz
david at davidmintz.org
Fri Feb 24 16:12:41 EST 2012
On Fri, Feb 24, 2012 at 4:11 PM, Rob Marscher <rmarscher at beaffinitive.com>wrote:
>
> On Feb 24, 2012, at 4:08 PM, Rob Marscher wrote:
>
> On Feb 24, 2012, at 4:04 PM, David Mintz wrote:
> ...snip...
>
> ob_start('mrobh')
>
> ...snip...
>
> I did a little googling and found this pretty relevant article:
>
> http://danhilltech.tumblr.com/post/18085864093/if-you-get-eval-base64-hacked-on-wordpress-dreamhost
>
>
> And another cleanup suggestion:
>
> http://blog.sucuri.net/2010/05/simple-cleanup-solution-for-the-latest-wordpress-hack.html
>
>
>
Very helpful! Thank you.
--
David Mintz
http://davidmintz.org/
It ain't over:
http://www.healthcare-now.org/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120224/cd33c6ab/attachment.html>
More information about the talk
mailing list