Hi David:

> My Dreamhost shared hosting account just had its *.php injected with some
> garbage.

Sorry.  Alas, injecting code into legitimate sites is the #1 source
these days of infecting end user computers.  So securing our rinky-dink
personal websites has become quite important.

I recently picked WordPress for a site and then looked for security
plugins for it.  The eventually lead me to write my own plugin, which
somehow wound up taking about six weeks of intense work.  I've passed it
around for testing and code review.  I'd love to hear the thoughts of
the people here on it from a code level and user interface level.

http://wordpress.org/extend/plugins/login-security-solution/


>        egrep -lr '<\?php.+eval\(base64_decode\("[^"]+"\)\);\?>'  *| xargs

I'd have just grep'ed for "eval", since that should never be in any code
I want to use.  Your regex would miss code that doesn't have double
quotes, doesn't use base64_decode, has spacing in it, etc.

Oh, and lock down your file permissions.  The web server shouldn't be
allowed to write to any files or directories.

Thanks,

--Dan

-- 
 T H E   A N A L Y S I S   A N D   S O L U T I O N S   C O M P A N Y
            data intensive web and database programming
                http://www.AnalysisAndSolutions.com/
 4015 7th Ave #4, Brooklyn NY 11232  v: 718-854-0335 f: 718-854-0409
_______________________________________________
New York PHP User Group Community Talk Mailing List
http://lists.nyphp.org/mailman/listinfo/talk

http://www.nyphp.org/show-participation

Reply via email to