A hacker upload files on server

Posted on 2014-01-14
Last Modified: 2014-01-26
Dear all,
recently our online server ( Hosting server with more then 200 web sites) attacked by hacker which separate some files all over the directories of our clients ,

I need to know how he upload such a files to our server?

Question by:ethar1
  • 4
  • 3
  • 2
  • +2
LVL 27

Expert Comment

ID: 39779646
I need to know how he upload such a files to our server?
I'm afraid nobody but that hacker can answer that. As to how it is possible, I don't think that can be answered before knowing the specifics of the server and it's security.

Author Comment

ID: 39779841
I meant the possible way ...
LVL 27

Expert Comment

ID: 39779863
As I wrote:
As to how it is possible, I don't think that can be answered before knowing the specifics of the server and it's security.
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.


Author Comment

ID: 39779898
do you have a specific question?
if you don't , no need to reply or answer me ... just give a chance to me and others to find a solution ....
LVL 27

Expert Comment

ID: 39779918
Good luck!
LVL 38

Expert Comment

by:Rich Rumble
ID: 39781101
It could be as simple as easy password to guess or anonymous access is granted, perhaps you have ports open that you shouldn't. Forms can be abused, php/asp and others can be abused. There are too many ways to name, the site could have a backdoor on it.

I would use Skipfish to scan your site and maybe it will help you pinpoint a few problems. Download and extract skipfish, open cmd promt, and use a command like this:
skipfish,exe -o c:\temp\mywebsite
You should create the c:\temp\mywebsite folder (doesn't have to be that name) and then change to your sites address.
The windows version of skipfish can be found here:
LVL 27

Expert Comment

ID: 39781452
How was it done? Could be FTP. Or scp. Or sftp. Or HTTP upload. Or telnet. Or SQL injection. Or malware. Or... Well, who knows how many possible ways? All we could do is list every possible way that files can be created and populated over a network. Technically, there are probably many thousands of possible ways.

In order to limit the number, we'd need to know details of every service and every app on your servers that can accept connections and write data to your local file systems. And then we'd have to know of vulnerabilities in the apps, ones that might be generally known only to the developers. (And maybe not even known to them.)


Author Comment

ID: 39782368
Thank you guys for replies ,

I think its a sql injection , cuz many resons  :
 - All application ( web sites) running on our server we had developed it.
 - unusual activities on SQL server last 2 3 days before the seeing the effect of attack.
 - the attack is very limited   its send 5 files with a html contents  :
   index.asp ,  default.cfm, default.htm, default.html, default.php, index.cfm, index.htm, index.php
-  Those files separated all over the hosting account in all folders except the www folder
I have this folder structure :

D:\HC\ResellerName\ClientName \ www \ ( some other folders depend on the application)

I notics that hacker can write the 8 files (mentioned above) on all folder except www , + he able to write those 8 files on sub folders under www.
 - Also we notices many SQL keywords in LOF file like : convert()  , version  , db_name, user_name substring() ,isnull ,ascii, lower

- But my understanding that sql injection effect only DB not files  , if it effect the files can you please tell me how to stop such a service of try to prevent its effect.

I use windows server 2003 + sql server 2008, + iis 6
LVL 38

Accepted Solution

Rich Rumble earned 500 total points
ID: 39782432
Again there is sooo much it could be, and SQL injection doesn't often result in file uploads. If you run wordpress, phpbb, durpal or many other forum or framework they all have exploits.
Take a very popular and well maintained framework like wordpress:
There are thousands of exploits for it. now think about one "your buddy" wrote for you... Coding is hard to do right and easy to do wrong. Security is often an after thought until you get burned. I'd find some tools or hire an individual to scan your site.
Unpatched versions of the webserver, apache, iis and others can be a cause, the programming language can be too, they need security updates and tight security settings.

Your case seems similar to this: Good tips if you have the same setup.

Author Comment

ID: 39782492
I don't use or run wordpress, phpbb, durpal  or any other system, we develop our own only..

Yes I know it may have some vulnerabilities ...

Yes my case exactly like the one you mentioned I will check it and come back to you ...

I use asp and only. which is make the attack very limited..
LVL 62

Expert Comment

ID: 39789039
Any vulnerability is fine.
Since you mention website - it could be httpd that can write data directories among others...

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Protecting a SKY 4.0 (Android) devise 15 130
Work with App store 7 52
copying evtx files while system is running 2 61
Review of apps API SSL Cert policy 2 21
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question