Zhimeng dedecms is often infected with Trojans

Source: Internet
Author: User
Tags file upload php and administrator password

There are two dream enterprises that have been infected with Trojans for a long time. Baidu cannot find any way to block the vulnerability.

Later, I did my own experiments and found the frequent Trojan entrance. Delete the entry file.

After deleting this file, I have observed that many Trojans have not been mounted for a long time. Now I will share it with you.

Delete the files/plus/ad_js.php/plus/mytag_js.php.

Note that if you delete the two files, the js call tag and the advertisement will be faulty. You can use the tag to call them directly.

Supplement:First, you should change the table prefix of the database during installation. You can change it to ljs _ without the default dedecms prefix dede.

2. Log on to the background and enable the verification code function. Delete the default administrator admin and change it to a dedicated and complex account. The administrator password must be at least 8 characters long, and mix letters and numbers.

Third, you must delete the install directory after installing the program.

Fourth, change the default directory name dede of dedecms background management.

Fifth, disable unused features, such as members and comments. If you do not need them, disable them in the background.

Sixth, the following are directories that can be deleted:

Member functions

Special features

Company Enterprise module

Plusguestbook message board

The following files can be deleted:

These files under the management directory are the background file manager, which is a redundant function and affects security the most. Many HACK uses it to Mount Trojans.

File_manage_control.php file_manage_main.php file_manage_view.php media_add.php media_edit.php media_main.php

Then:

Delete the dede/sys_ SQL _query.php file without the SQL command runner.

If you do not need the tag function, delete tag. php in the root directory. Delete digg. php and diggindex. php in the root directory.

7. Pay more attention to the security patch officially released by dedecms and promptly install the patch.

Eighth, download the release function (manage soft _ xxx_xxx.php in the directory). You can delete it if you don't need it. This is also easier to upload the pony.

9. Log on to the DedeCms official website to view the universal security protection code.

10. The safest way: publish html locally and then upload it to the space. It does not contain any dynamic content. Theoretically, it is the safest, but maintenance is relatively troublesome.

11. I still have to check my website frequently. It is a trivial matter to be hacked. Trojan horse or program deletion will be miserable. If I am not lucky, the ranking will also fall. So remember to back up data from time to time.

So far, the malicious script files we have discovered include

Plus/ac. php

Plus/config_s.php

Plus/config_bak.php

Plus/diy. php

Plus/ii. php

Plus/lndex. php

Data/cache/t. php

Data/cache/x. php

Data/config. php

Data/cache/config_user.php

Data/config_func.php, etc.

Most uploaded scripts are concentrated in the plus, data, and data/cache directories. Check whether the three directories have been uploaded recently.

By checking the server access log file, I know that the hacker is post to these two files and then generates the php file on the server, and then operates on your server. Deleting these two files solves the problem of Trojan infection for a long time!

Server

In addition to the above methods, you can also install them on the server. For example, you can install dongle and sell coffee to restrict directories. One is to restrict the writing of PHP files, and the other is to restrict the modification of tables, at the same time, the directory C disk cannot be casually put into exe, dll and other executable files. In this way, there is a bug that cannot write executable files to your host, and the image file Upload directory cannot execute php files.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.