I wrote a script for Cpanel + Pure FTP + Clamav installed servers.
/http://www.oxio.net/anti_gumblar/
Anti-Gumblar Protection Documentation
/http://www.oxio.net/anti_gumblar/
Anti-Gumblar Protection Documentation
I've added a new wordscan function on last release.Does it catch up .cgi scripts (dark mailer etc.), who are a able to send out spam?
$GLOBALS["whmhash"] ="511e....2c"; // whm remote access key for root user
Thanks...Well working fine on my cPanel 11.24.5-R37946 - WHM 11.24.2 - X 3.9, CENTOS 5.3 x86_64 standard as far as catching the attack, it quarantines the files and sends the mail, but no other actions, does not log IP, IP blocking, password change is not working.
I am running it at a different location than /root and edited the script a bit to save log at /var/log/ftp_clamscan.log
This script need PHP function shell_exec to be enabled.
Though I must say its a good job and can be made better.
There is no special function about 32bit or 64 bit. If php, clamav, cpanel, pure-ftpd, CSF ( or APF, or similar Firewall ) is working on your server this script works too.Tried on 64-bit OS, not working.
This is Remote Access Key. Script using this key for access to whm and changing password of attacked domain.What is this mean ?Code:$GLOBALS["whmhash"] ="511e....2c"; // whm remote access key for root user
Can I install this script under /usr folder not /root folder ? I know that some configuration on ftp_clamscan.php has to be change to /usr. But is there any downside not using root folder ?
Warning !!!
17.08.2009 12:26:52 Monday
There is a GUMBLAR ATTACK on account
Infected file : /home/vncind/public_html/support/templates/Bliss/images/index.php
Infection : .ru:8080/ at line 50
Action : File moved to : /karantina/clamav//index.php.20090817122652
Password might be changed to : ibHpcgHVOk
Ret : Array<passwd>
<passwd>
<rawout></rawout>
<services></services>
<status>0</status>
<statusmsg>No account was specified.</statusmsg>
</passwd>
</passwd>
<!-- Web Host Manager (c) cPanel, Inc. 2008 cPanel Inc. Unauthorized copying is prohibited. -->
Process Killed :
Yes ftp_clamscan.sh and ftp_clamscan.php is different files. ftp_clamscan.sh is passing FTP values to ftp_clamscan.php. If you don't use .sh file username will not discovered...Do you mean ftp_clamscan.sh and ftp_clamscan.php are two different files?
I am using only ftp_clamscan.php that is provided by you at http://www.oxio.net/anti_gumblar/ftp_clamscan.phps
I have followed the instructions at Anti-Gumblar Protection Documentation
If the file ftp_clamscan.sh is a different file, where to get it from and where to read more about it?
Thread starter | Similar threads | Forum | Replies | Date |
---|---|---|---|---|
M | ClamAV fails to start on CloudLinux 6 after updating to 100.0.8 solution | Security | 2 | |
![]() |
A problem I do not know have a solution | Security | 3 | |
J | Symlink Solution for OpenVZ / Virtuozzo | Security | 2 | |
![]() |
Solutions for handling ddos attacks? | Security | 3 | |
T | Hacking threat - and my idea for solution: | Security | 3 |