On cPanel server, default user name is very easy to guess. For example, suppose domain name is: yourdomain.com then the user name will be yourdoma or something like this. So hacker can easily brutforce it and can get FTP access to upload suspicious php shells under your account. Using PHP shells, hacker can do mass […]
See MoreTag: web hosting
How to Remove “eval(base64_decode”
First, we must find all infested files using following command. root@hr# cd /home/username/public_html/ root@hr#grep -lr –include=*.php “eval(base64_decode” * How to Remove the code ? grep -lr –include=*.php “eval(base64_decode” /home/username/public_html/ | xargs sed -i.bak ‘s/<?php eval(base64_decode[^;]*;/<?php\n/g’ Please try it.
See MoreCpanel: Various Log Paths
1. Apache Logs: /usr/local/apache/logs/error_log 2. cPanel Logs /usr/local/cpanel/logs/error_log 3. Exim Logs: /var/log/exim_mainlog 4. FTP and Server logs /var/log/messages 5. Cron logs: /var/log/cron 6. Mysql Logs /var/lib/mysql/hostname.err Thanks.
See More
You must be logged in to post a comment.