
Habbohut have posted a thread about it though at 9:25 am AEST yesterday.
Interesting how quickly the hackers hopped from one site to another! Glad Habbox was safe!
Honestly the locking rooms comment made me LOL. I remember when I was a newb and thought that would keep my precious furni safe -eye roll-.
having hard time finding the hidden code that is redirecting our site.
Ctrl+F in Notepad or whatever you use
Type redirect.
Find redirect code in files. Likely done.
If you're using Linux just use grep to search inside files
Thanks, but this would not have helped as they used a Base69 Encryption, that made the line of code look like:
Had to do a lot of digging. First I found out using a site, that Swat's site was being redirected via "Header Coder" Secondly I had to accept the fact that the code could be encrypted, thus causing me to use a website to search for base69 encryptions. The first file that came up, I searched and found that code, I used a decoder to find out what it means, and find out that the line is actually "Double Encrypted" so I take a leap of faith and delete the line. Test my site, and find that it is no longer being redirected! Wott! Wott!HTML Code:header(base64_decode('TG9jYXRpb246IGh0dHA6Ly9yb2ZsLmxhbmQv'));
Hacking and finding vulnerabilities definitely isn't a good thing. Shows how selfish and self-centered you are. Can't think about anyone else.
Shot in the dark here but...yeshellothere
Mysterious hackur here: (proof - http://rofl.land/lol.txt)
You're all way off. And the majority of you suck ass.
that's all
thanks
<=3
$temp = unserialize($check);
add:
$temp = json_decode($check,true);
then running:
serialize($_POST) changed to json_encode($_POST)
PHP object injection?
Pretty sure that was a problem recently, if I remember correctly @xxMATTGxx
PHP object injection is literally useless in vanilla vBulletin. There's no exploitable magic methods. It only becomes a danger when you couple it with poorly made plugins.Shot in the dark here but...
$temp = unserialize($check);
add:
$temp = json_decode($check,true);
then running:
serialize($_POST) changed to json_encode($_POST)
PHP object injection?
Pretty sure that was a problem recently, if I remember correctly @xxMATTGxx
Note how one forum was IPB and one was MyBB, too.
Want to hide these adverts? Register an account for free!