<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4681088955535167126</id><updated>2024-11-01T03:33:16.965-07:00</updated><category term="internet security"/><category term="badware"/><category term="malware"/><category term="security"/><category term="webmasters"/><category term="Stopbadware"/><category term="security tools"/><category term="BadMal"/><category term="ethics"/><category term="Española"/><category term="RBN"/><category term="google"/><category term="Alexa"/><category term="Amazon"/><category term="China"/><category term="economics"/><category term="hack detection"/><category term="iframe"/><category term="layered technologies"/><category term="layeredtech"/><category term="mcafee"/><category term="php"/><title type='text'>BadMalWeb</title><subtitle type='html'>BadMalWeb - Hide and seek on the web. &#xa;&#xa;Blog of an Internet activist, BadWare hunter. Includes anything from Malware, Spyware, Ad-Networks, viruses, and spam. Taking action and various tools.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>14</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-7083986667981522848</id><published>2007-10-16T20:01:00.000-07:00</published><updated>2007-10-16T20:06:11.314-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BadMal"/><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="security tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Stopbadware"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Man-in-the-Middle (MITM) Exploits; what they are and how to STOP them</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;Most of us defend our PCs, websites and servers with an increasing variety of “anti” tools; however it is equally important to understand how or where an assault comes from. So when personally considering your own PC or Internet security this takes a proactive offensive view “I can do something to &lt;span class=&quot;caps&quot;&gt;STOP&lt;/span&gt;…” rather than a passive “hiding in the bunker ” defensive position. The best form of defense is offence?    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The main route for many web site hacks, defacement, and denial of service (DDoS) attacks is Man-in-the-Middle (MITM) exploits.  It is a very easy concept to understand for all of us; consider an unknown person is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.  It has a very techie background for those who want to know more – check out Wikipedia for the background or definitions. Here I will solely deal with a pragmatic approach of what you can do to &lt;span class=&quot;caps&quot;&gt;STOP&lt;/span&gt; any &lt;span class=&quot;caps&quot;&gt;MTIM&lt;/span&gt;.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Firstly a healthy element of paranoia helps, consider from the PC you are reading this article with, what possible connections are there?  Home or office network, local &lt;span class=&quot;caps&quot;&gt;ISP&lt;/span&gt;, regional backbone routers, international re-routers, &lt;span class=&quot;caps&quot;&gt;DNS&lt;/span&gt; servers, server farms, ad networks, web site host, and finally the web site, &lt;span class=&quot;caps&quot;&gt;MITM&lt;/span&gt; could be lurking inside anyone of these connections, points or nodes, and as we know so well at StopBadware, within a script on a web site. Worried? Don’t be; just assume the &lt;span class=&quot;caps&quot;&gt;MITM&lt;/span&gt; is there, you have the all the solutions at hand and mostly free. The answer is in the technical background “cryptography”, i.e. encryption, passwords, Chmod (website file permissions), and &lt;span class=&quot;caps&quot;&gt;CAPTCHA&lt;/span&gt; (establishing the user is a human). Action checklist for all:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Email: use a digital ID or certificate (low cost), &lt;span class=&quot;caps&quot;&gt;PGP&lt;/span&gt; encryption (pretty good privacy – free), and as a surprise for sensitive email I now use and recommend Gmail with &lt;span class=&quot;caps&quot;&gt;HTTPS&lt;/span&gt;, less connections! All this &lt;span class=&quot;caps&quot;&gt;STOPS&lt;/span&gt; any &lt;span class=&quot;caps&quot;&gt;MITM&lt;/span&gt; from being able to read your emails.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Web Surfing: Only access online shops or other personal ID sensitive areas where there is &lt;span class=&quot;caps&quot;&gt;HTTPS&lt;/span&gt; (SLL), look at the web address, use secure and change your passwords regularly. If you really want to be in control use Firefox with added extras e.g. No-Script (STOPS any script, unless you say OK), Key Scrambler (encrypts any login or password entry &lt;span class=&quot;caps&quot;&gt;STOPS&lt;/span&gt; keyloggers), set your privacy options to accept any cookie (STOPS unwanted and bad cookies from being stored on your PC), even consider using PHproxy (this &lt;span class=&quot;caps&quot;&gt;STOPS&lt;/span&gt; a web site from even gaining your real IP address).&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Webmasters: Only use &lt;span class=&quot;caps&quot;&gt;FTPS&lt;/span&gt; to transfer files between your web site and the PC (this &lt;span class=&quot;caps&quot;&gt;STOPS&lt;/span&gt; any &lt;span class=&quot;caps&quot;&gt;MITM&lt;/span&gt; from intercepting data), use Chmod to restrict access to files, encrypt file directories where you can, apply different passwords to access cPanel, phpMyAdmin, use &lt;span class=&quot;caps&quot;&gt;CAPTCHA&lt;/span&gt; for user logins and apply &lt;span class=&quot;caps&quot;&gt;SSL&lt;/span&gt; for user data areas (these actions &lt;span class=&quot;caps&quot;&gt;STOP&lt;/span&gt; any &lt;span class=&quot;caps&quot;&gt;MTIM&lt;/span&gt; from gaining access to your files.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Blocking: Probably the best offensive action you can take, think of it like this “your PC is your home your website is your shop, club, bar, you have the total right to bar entrance to hooligans or thieves”.  It is much easier to refuse entrance than to try and throw the unwanted visitor out.  For example use OpenDNS on your router it is free, automatically &lt;span class=&quot;caps&quot;&gt;STOPS&lt;/span&gt; phishing sites and many other blocking options. Use banning lists on cPanel, ban spammers on your forum, or ask your host for help.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;    &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Finally refuse to be a victim and hide in the bunker, &lt;span class=&quot;caps&quot;&gt;STOP&lt;/span&gt; the &lt;span class=&quot;caps&quot;&gt;MTIM&lt;/span&gt; you actually have all the tools at hand. But…. what if a &lt;span class=&quot;caps&quot;&gt;MITM&lt;/span&gt; is already hiding inside before you go on the offensive?  Check and clean your PC of any BadWare; for the webmaster does your webhost also host any bad guys? Easy to determine, check the latest block lists on the web.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/7083986667981522848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/7083986667981522848' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7083986667981522848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7083986667981522848'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/10/man-in-middle-mitm-exploits-what-they.html' title='Man-in-the-Middle (MITM) Exploits; what they are and how to STOP them'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-6937732728915442927</id><published>2007-10-01T07:49:00.000-07:00</published><updated>2007-10-01T08:43:52.586-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="economics"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="mcafee"/><category scheme="http://www.blogger.com/atom/ns#" term="RBN"/><title type='text'>Cost of Cyber crime = $105 billion?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;A great deal of press concerning the CEO of McAfee statement,  DeWalt said, &quot;...... that cyber-crime has become a US$105 billion business that now surpasses the value of the illegal drug trade worldwide.&quot;  In a follow up comment in McAfee&#39;s blog &lt;/span&gt;&lt;a style=&quot;font-family: trebuchet ms;&quot; href=&quot;http://siblog.mcafee.com/?p=192&quot; title=&quot;Permalink&quot;&gt;Lies, Damn Lies and Statistics&lt;/a&gt; trying to stress the input came from &lt;a style=&quot;font-family: trebuchet ms;&quot; href=&quot;http://archive.cert.uni-stuttgart.de/isn/2005/11/msg00123.html&quot;&gt;Reuters&lt;/a&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt; and &lt;/span&gt;&lt;a style=&quot;font-family: trebuchet ms;&quot; href=&quot;http://money.cnn.com/2005/12/29/technology/computer_security/index.htm&quot;&gt;here for CNN&lt;/a&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;, based upon &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;the &lt;a href=&quot;http://www.gao.gov/new.items/d07705.pdf&quot;&gt;Government Accountability Office recognized this in its June 2007 report&lt;/a&gt;.  &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;However, DeWalt was right from the perspective &quot;.....clearly, placing a value on the size of the cybercrime economy is a real challenge.&quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;As an example the recent VeriSign / iDefense analysis on the &lt;a href=&quot;http://en.wikipedia.org/wiki/Russian_Business_Network&quot;&gt;Russian Business Network&lt;/a&gt; (RBN) showed - see: The Economist &lt;a href=&quot;http://www.economist.com/displaystory.cfm?story_id=9723768&quot;&gt;article&lt;/a&gt; - just for one venture, Rock Phish, they netted $150 million in one year. As an example the RBN’s network, its affiliates, “free-hosting” sites, and associated businesses, the overall dollar value is much more substantial. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;However, the &lt;a href=&quot;http://rbnexploit.blogspot.com&quot;&gt;RBN&lt;/a&gt; is one of the most obvious for quantification. If one was to include malware, spyware, spam, and general BadWare, which most end users who have been victims would definitely call  - cyber-crime -. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;Therefore the $105 billion quoted is an underestimate?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/6937732728915442927/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/6937732728915442927' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/6937732728915442927'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/6937732728915442927'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/10/cost-of-cyber-crime-105-billion.html' title='Cost of Cyber crime = $105 billion?'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-4794199668595497644</id><published>2007-09-26T15:54:00.000-07:00</published><updated>2007-09-26T16:00:16.171-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack detection"/><category scheme="http://www.blogger.com/atom/ns#" term="php"/><category scheme="http://www.blogger.com/atom/ns#" term="security tools"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Injection hack detection method - PHP Code</title><content type='html'>&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;A good working &lt;span id=&quot;thread_subject_site&quot;&gt;   Injection hack detection method provided by Ez via &lt;a href=&quot;http://groups.google.com/group/stopbadware/browse_thread/thread/6d3a72b4e17a26dc?hl=en&quot;&gt;StopBadWare Forum&lt;/a&gt;&lt;/span&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The script is brutally simple because we needed a quick fix. If the hacks recur I will make it smarter. Its only purpose is to tell me if a critical file (such as index.php) has changed size. I assume that injection hacks change the file size, as they did on our site.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;A smarter script would compare file mod times with a database record. This would require a more complex script because it would have to store legitimate mod timestamps and depend on a human (unless more complex still, including the IP or http login etc.).&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Operating scenario --&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;1.) Hacker injects code, increasing the file size.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;2.) Next request to serve the home page (or other page of your choice) triggers the detector, which compares current file size with that for archived original.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;3.) Detector sends email with file mod timestamp to webmaster.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;4.) Script replaces hacked file with copy of an archived original, exits.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The webmaster needs to keep track of the most recent authorized file modifications (presumably by the webmaster). The email includes the timestamp of the over-size file&#39;s mod time. The system admin (or tech&lt;br /&gt;support) uses this timestamp to trace the hack through the server log and identify the mode of entry.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;To get fancier, you could scan all files in a directory for the mod time (example, using the PHP filemtime() function), comparing with a database record of legitimate mod timestamps.&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;Anyhow, here&#39;s the index file size script. I keep utility functions in &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;a separate file named &quot;func.inc&quot; so it needs to load first. But this &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;isn&#39;t necessary. Then the function compares the size of the file that &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;usually gets hacked (such as index.php) and compares it with a &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;reference copy (x_index.php) in a secure directory (&quot;refz&quot;). Of &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;course, you can also loop through a list of filenames that are popular &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;hack targets. The function can return the file write result, but I &lt;/span&gt;&lt;span style=&quot;font-family: trebuchet ms;font-size:85%;&quot; &gt;don&#39;t use it. &lt;/span&gt;&lt;br /&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;/* top of index.php, after DOCTYPE declaration */&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;?php&lt;br /&gt;function hackDet () {&lt;br /&gt;        $tst    = &quot;&quot;;&lt;br /&gt;        $gzt    = &quot;index.php&quot;;&lt;br /&gt;        $stat   = stat($gzt);&lt;br /&gt;        $gzt2   = &quot;refz/x_&quot; . $gzt;&lt;br /&gt;        $rstat  = stat($gzt2);&lt;br /&gt;        $ref    = $rstat[size];&lt;br /&gt;        $rtim   = $_SERVER[&#39;REQUEST_TIME&#39;];&lt;br /&gt;        $rtim2  = date(&quot;F d Y H:i:s.&quot;, $rtim) . &quot; Eastern&quot;;&lt;br /&gt;        $mtim   = filemtime($gzt);&lt;br /&gt;        $mtim2  = date(&quot;F d Y H:i:s.&quot;, $mtim) . &quot; Eastern&quot;;&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;        if ($stat[size] &lt;&gt; $ref)&lt;br /&gt;        {&lt;br /&gt;                $fw             = &quot;index.php&quot;;&lt;br /&gt;                $hak    = file_get_contents($fw);&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;                $msg    = &quot;$gzt has $stat[size] bytes and not $ref as it should.\n\n&quot;;&lt;br /&gt;                $msg    .= &quot;FILE MOD TIME $mtim: $mtim2\n&quot;;&lt;br /&gt;                $msg    .= &quot;REQUEST_TIME $rtim: $rtim2\n\n&quot;;&lt;br /&gt;                $msg    .= &quot;=================\n\n&quot;;&lt;br /&gt;                $msg    .= $hak;&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;                $msg    = wordwrap($msg, 70);&lt;br /&gt;                mail(&#39;yourn&lt;a target=&quot;_parent&quot; href=&quot;http://groups.google.com/groups/unlock?msg=64582368b1f15ca3&amp;amp;hl=en&amp;amp;_done=/group/stopbadware/browse_thread/thread/6d3a72b4e17a26dc%3Fhl%3Den&quot;&gt;...&lt;/a&gt;@yourdomain.com&#39;, &#39;HACK ALERT&#39;, $msg);&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;                $fr             = &quot;refz/x_index.php&quot;;&lt;br /&gt;                $str    = file_get_contents($fr);&lt;br /&gt;                $tst    = file_put_contents($fw, $str);&lt;br /&gt;        }&lt;br /&gt;        return $tst;&lt;br /&gt;&lt;/span&gt; &lt;/p&gt;&lt;div id=&quot;qhide_325733&quot; style=&quot;display: block; font-family: trebuchet ms;&quot; class=&quot;qt&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;}&lt;br /&gt;&lt;br /&gt;&lt;/span&gt; &lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;$tst            = hackDet();    // calls the hack detection function &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt; ?&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/4794199668595497644/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/4794199668595497644' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4794199668595497644'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4794199668595497644'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/09/injection-hack-detection-method-php.html' title='Injection hack detection method - PHP Code'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-8275266227253057346</id><published>2007-09-23T19:17:00.000-07:00</published><updated>2007-09-23T19:22:42.178-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="ethics"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>China as an Internet Threat - The facts!</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;I really do find some of the current wave of rhetoric about the threat to the internet from China really worrying, if not downright dangerous for international relations. I suppose it a good topic for poor technical journalism, to gain publication in US &amp;amp; European journals / web. Old adage; &quot;Why let the facts spoil a good story&quot;?&lt;br /&gt;&lt;br /&gt;Ref:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;a href=&quot;http://www.news.com/China-leads-Asia-in-malicious-online-activity/2100-7348_3-6209172.html?tag=cd.top&quot;&gt;China leads Asia in malicious online activity - CNet News&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;Let me make my position clear, I am not Chinese and I do not live in China, however I do know a thing or two about internet security threats. Here are some facts for the readers who possibly might read the above article and take it as factual:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;(a) As of Sept 20 07 the US is the clear leader in known Spam issues, by 5:1 over China (ref Spamhaus.org).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;(b) The internet is global and any quantitative analysis must base itself on comparative users. Reasonable estimates now show about 2:1 of Chinese internet user access over US users and anywhere from 5 to 20:1 over other Asian countries. Based on this on any Spam or malware distributor estimation this would place China about tenth on any list on countries, and well down the list in Asia. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;(c) In China there are severe legal penalties for such acts, recently Yahoo could distribute malware to 15 million of its users and hardly gets a technical press mention, and no legal sanction.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;(d) Why you may ask am I so concerned? On a recent exploit tracking exercise, despite apparent Chinese language sites being the cause. These sites were actually based and funded out of Toronto with bullet proof servers out of San Francisco! &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: trebuchet ms;&quot;&gt;Remember it is just as easy to get a free mail.cn / low cost Chinese based hosting, or mail.ru for that matter, being based in the US. As it is to get a Hotmail or Yahoo hosting account.&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/8275266227253057346/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/8275266227253057346' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/8275266227253057346'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/8275266227253057346'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/09/china-as-internet-threat-facts.html' title='China as an Internet Threat - The facts!'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-7804297268704889977</id><published>2007-09-19T05:58:00.000-07:00</published><updated>2007-09-19T06:09:09.473-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BadMal"/><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="iframe"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="layered technologies"/><category scheme="http://www.blogger.com/atom/ns#" term="layeredtech"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="RBN"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>iFrame Injection Source?</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Sources for iFrame injection? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Try this one as a  site and a &quot;major&quot; source, which is so blatant it is mind boggling, and truly worth &quot;outing&quot;.  Those webmasters who have been flagged and have battled against iFrame injection, here is one of the major sources, try blaming these guys as opposed to Google / StopBadWare. Luckily a few of us have just recently been able to get McAfee&#39;s Site Advisor to blacklist them (Red X).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;iFrameDollars (dot) com - &lt;a href=&quot;http://www.siteadvisor.com/sites/iframedollars.com&quot;&gt;http://www.siteadvisor.com/sites/iframedollars.com&lt;/a&gt; - Just so you knwo they pay webmasters / smaller hosts to inject iFrame exploits on other websites!!!!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;To cover this here is a email sent to their US based host - still unanswered! - Please help by contacting them. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;To &quot;&lt;a href=&quot;http://www.layeredtech.com/&quot;&gt;Layered Technologies&lt;/a&gt;&quot; Abuse Team - you can contact them on Phone: &lt;span style=&quot;font-weight: bold;&quot;&gt;1-866-584-6784&lt;/span&gt;, General Information: &lt;a href=&quot;http://www.blogger.com/info@layeredtech.com&quot;&gt;info@layeredtech.com&lt;/a&gt;, Sales Information: sales@layeredtech.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;-------------------------------------------------------&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Hi,&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Checking your acceptable use policy, how come you allow iFramedollars com to have dedicated serving or any hosting at all?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Do you have any idea what they actually do? Check out their web site or even better check out their business model as they still call it iFrame Cash as their earlier form iFrameDollars biz; try:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;ISC Sans = iframeDOLLARS; Cyber Extortion, &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Spamhaus = http://www.spamhaus.org/rokso/evidence.lasso?rokso_id=ROK7615&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;http://sunbeltblog.blogspot.com/2006/06/those-nice-dear-boys-at-iframecash.html &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;and many many more......&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Please note the registrant info etc., exactly the same on 72.36.199.58 as within the Rokso lasso, even more obvious is the web site still states iFrame Cash &amp;amp; iFrame biz, and the same iFrame exploit &quot;affiliate&quot; model.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;As someone who helps out on website clean ups, they currently claim 300 webmasters who essentially are injecting and spreading iFrame exploits for cash.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I am certain StopBadWare, Spamhaus, ISC Sans, FBI, etc., etc. will only be too surprised to now learn the RBN&#39;s (Russian Business Network) so called &quot;bullet-proof hosting&quot; is actually based within the US at layeredtech (dot) com.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I look forward to your reply. &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;-----------------------------------------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;As mentioned, no reply to 5 emails, maybe we all should enquire of layeredtech.com we could make the difference?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;Here are a few questions and points:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;(1) Can StopBadWare / Google do anything about this flagrant abuse of the webmaster community? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;(2) Here is the clearest example of the need for a public blacklist list of &quot;professional&quot; Badware distributors (thanks to Site Advisor, but how about here)?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;(3) We sometimes rightly debate about Twinky, Zango, etc., how about deliberately distributing iFrame exploits for $$$ as an affiliate, any one prepared to defend this?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;(4) Who would also like to know who the 300+ host / webmaster affiliates (BadWare distributors) are of &quot;iframe Cash&quot;? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;(5) Just so you know, after you have been flagged by Google, lost business, and spent sleepless nights trying to fix your web site, and keep it clean; the FrameCash affiliates get about $1.50 for your site , as long as they produce a minimum of 50 sites per month!!!&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;I told you mind boggling!&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/7804297268704889977/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/7804297268704889977' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7804297268704889977'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7804297268704889977'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/09/iframe-injection-source.html' title='iFrame Injection Source?'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-7104856487453198358</id><published>2007-09-04T21:35:00.000-07:00</published><updated>2007-09-04T21:49:27.023-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ethics"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Searching for Evil - InfoSec</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://video.google.com/videoplay?docid=-1380463341028815296&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqnX-rdv5uVu5j38PqnBfVpTtB31Wt5pswLVkQIxv-9cz75zTUgdvqe1K_zCjH44PeR3ES_Fo67L5Z4mz9p07Y687gNno_prccBvneUBFxdUZ8Ir49WPDaFMqUtoiyk4iy3xK2MQPXKYA/s320/SearchEvil.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5106576587215990386&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;I have to say this was one of the best presentations I have seen related to the wider issues of InfoSec. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;file:///C:/Users/corexvii/AppData/Local/Temp/moz-screenshot.jpg&quot; alt=&quot;&quot; /&gt;&lt;img src=&quot;file:///C:/Users/corexvii/AppData/Local/Temp/moz-screenshot-1.jpg&quot; alt=&quot;&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:-1;&quot;&gt;ABSTRACT&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:-1;&quot;&gt;Computer security has recently imported a lot of ideas from economics, psychology and &lt;span class=&quot;invisible&quot; id=&quot;alldescr&quot;&gt; &lt;b&gt;...&lt;/b&gt; &lt;a href=&quot;javascript:void(0)&quot; id=&quot;expandlink&quot; onclick=&quot;&#39;ele(&quot; classname=&quot;invisible&quot; vp_usertouchedsomething=&quot;true;&#39;&quot; style=&quot;color: rgb(119, 119, 204);&quot;&gt;all &lt;b&gt;»&lt;/b&gt;&lt;/a&gt;&lt;/span&gt; &lt;span id=&quot;wholedescr&quot; class=&quot;visible&quot;&gt;sociology, leading to fresh insights and new tools. I will describe one thread of research that draws together techniques from fields as diverse as signals intelligence and sociology to search for artificial communities.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:-1;&quot;&gt;&lt;span id=&quot;wholedescr&quot; class=&quot;visible&quot;&gt;Evildoers online divide roughly into two categories - those who don&#39;t want their websites to be found, such as phishermen, and those who do. The latter category runs from fake escrow sites through dodgy stores to postmodern Ponzi schemes. A few of them buy ads, but many set up fake communities in the hope of having victims driven to their sites for free. How can these reputation thieves be detected?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:-1;&quot;&gt;&lt;span id=&quot;wholedescr&quot; class=&quot;visible&quot;&gt;Some of our work in security economics and social networking may give an insight into the practical effects of network topology. These tie up in various ways with traffic analysis, long used by the signals intelligence agencies which trawl the airwaves and networks looking for interesting targets. I&#39;ll describe a number of dubious business enterprises we&#39;ve unearthed. Recent advances in algorithms, such as Newman&#39;s modularity matrix, have increased the robustness of covert community detection. But much scope remains for wrongdoers to hide themselves better as they become topologically aware; we can expect attack and defence to go through several rounds of coevolution. I&#39;ll therefore end up by talking about some strategic issues, such as the extent to which search engines and other service providers could, or should, share information in the interests of wickedness detection.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:-1;&quot;&gt;&lt;span id=&quot;wholedescr&quot; class=&quot;visible&quot;&gt;&lt;br /&gt;Speaker:  Ross Anderson Ross Anderson is one of the top security researchers in the world.&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/7104856487453198358/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/7104856487453198358' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7104856487453198358'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/7104856487453198358'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/09/searching-for-evil-infosec.html' title='Searching for Evil - InfoSec'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqnX-rdv5uVu5j38PqnBfVpTtB31Wt5pswLVkQIxv-9cz75zTUgdvqe1K_zCjH44PeR3ES_Fo67L5Z4mz9p07Y687gNno_prccBvneUBFxdUZ8Ir49WPDaFMqUtoiyk4iy3xK2MQPXKYA/s72-c/SearchEvil.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-393577813414903302</id><published>2007-08-27T05:15:00.000-07:00</published><updated>2007-08-27T05:30:12.182-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BadMal"/><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="security tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Stopbadware"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Rebecca the Webmaster - A StopBadWare Case Study: Practical Guide for Webmasters (1 of 3)</title><content type='html'>&lt;div style=&quot;text-align: justify; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Don&#39;t panic!!!&quot; - Rebecca the Webmaster - A StopBadWare Case Study: Practical Guide for Webmasters– descriptions of tools we used. (Part 1 of 3) - In-depth analysis of problems and issues (Part 2 of 3), - Avoiding problems in &gt; the future (Part 3 of 3)&lt;br /&gt;&lt;br /&gt;This is the requested follow up from “Rebecca the Webmaster - this is my story, no tears, no glory.” Here we describe the problem solving methodology, analysis, tools used, web code issues, and steps taken to avoid problems in the future. The “we” are Rebecca a newbie webmaster with the guidance of El Jart, also we made sure that although Jart started with his “geek” tools (which I could not even understand the names of), we made sure anything we used was available to all and “free” – no commercials. Remember if I can learn to do this anyone can.&lt;br /&gt;&lt;br /&gt;Introduction&lt;br /&gt;First of all let us stress the obvious; regular checks of the tools available to virtually all webmasters are the way to avoid being flagged by Google in the first place, see how to avoid problems below. However, remember even the best web sites get hacked or compromised, for example AOL or MSN, so the most important advice from The Hitchhiker’s Guide to the Galaxy “Don’t Panic!!!”&lt;br /&gt;&lt;br /&gt;The Tools&lt;br /&gt;Just a word of caution, the tools below worked for us, however do get the help of your web host and only do this work if you have a PC with a really good anti-virus, anti-spyware etc. The stuff you are trying to clean up can bite; also make sure your PC is clean in the first place!&lt;br /&gt;&lt;br /&gt;1.    Server access – I know it sounds obvious but to start with as the site webmaster I realized I did not have full access or know what tools were available. So check this first, if you use CPanel or similar many of the tools to clean up and check are there e.g. http://www.cpanel.net/docs/cpanel/&lt;br /&gt;&lt;br /&gt;2.    Firefox and add ons – As the webmaster you have to be able to look at the site and check what is called. What we mean by this is the “scripts”, for example you may use a simple Ad or banner, what is actually called by your web site, e.g. the “inline scripts”, “cookies” etc. Just a note for end users if you surf with Firefox and these add ons https://addons.mozilla.org/en-US/firefox/browse/type:1  your surfing is a lot safer, it is then up to you if you want to accept scripts, cookies or other downloads. &lt;br /&gt;&lt;br /&gt;a.    Firefox – ensure latest version (set for no-popups and cookies to manually accept)&lt;br /&gt;b.    Google toolbar (add on) – this helps to search the web for any terms or third party web addresses, but for me if you search “define:sql injection” you can get any description to help you or use “site:anywebsite.com” “inurl:anywebsite.com” “cache:anywebsite.com” you see a lot more about any web site, including your own.&lt;br /&gt;c.    McAfee Site Advisor (add on)– Just to check out any web address you come across, especially on any spam or script. &lt;br /&gt;d.    No-Script (add on) – this is great because when used you can look at a web sites but any script on the web site is disabled.&lt;br /&gt;e.    PhProxy (add on) – Using this you can go to any website without using your real IP address, however this is for the first safe look, you have to switch this off when you look at “inline scripts”&lt;br /&gt;f.    Edit Cookies (add on) – Now you can see any cookies, before you accept them&lt;br /&gt;g.    DOM Inspector (add on) – Lets you inspect a web window and its contents.&lt;br /&gt;h.    Safe cache (add on) – Prevents any cache based privacy attacks.&lt;br /&gt;i.    Key scrambler (add on) – This encrypts any passwords you type on your PC for websites; just in case there are keyloggers in action. &lt;br /&gt;j.    Web developer (add on) – This lets you check the actual scripts called, in other words not what you think is on your website, but what the user actually gets.&lt;br /&gt;&lt;br /&gt;3.    Notepad ++ - This is an Open Source text editor, using this you can capture or download text, HTML, scripts, server log files, SQL, and save for later examination.&lt;br /&gt;&lt;br /&gt;4.    SmartFTP – There are several around this is the one we used, simply because you can use it in a secure mode and set / reset file permissions, so you help being attacked again.&lt;br /&gt;&lt;br /&gt;5.    Windiff – A free utility so you can compare directories that you FTP as a backup from your website to your PC and even individual files.&lt;br /&gt;&lt;br /&gt;6.    On the server (assumes PHP &amp; MySQL);&lt;br /&gt;&lt;br /&gt;a.    Server Log files – just use your secure FTP to download and check in your text editor&lt;br /&gt;b.    PHPmyAdmin – now this is daunting at first but a bit of reading http://www.phpmyadmin.net/home_page/docs.php soon help to master this, in our case this was vital to down load and backup the website databases. This is where we found most of the problems that could have re-infected / re-hijacked us.&lt;br /&gt;c.    PhpBB – forum tools http://www.phpbb.com/community/ lots of help here.&lt;br /&gt;&lt;br /&gt;7.    Common sense – Maybe the most important webmaster tool as Jart kept on stressing, what should be within the website; its scripts, files, on the forums, within the SQL databases, etc. If you see a call to some website you do not recognize check it out. If some script is calling to download a special multi-media application, is it the real one? If some website / bot is coming to your site (on the server log files) every 10 seconds, why is it coming? What is its purpose or even more important what is calling it? Simple really.&lt;br /&gt;&lt;br /&gt;1 of 3&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/393577813414903302/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/393577813414903302' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/393577813414903302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/393577813414903302'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/rebecca-webmaster-stopbadware-case.html' title='Rebecca the Webmaster - A StopBadWare Case Study: Practical Guide for Webmasters (1 of 3)'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-3654681147802989667</id><published>2007-08-27T05:08:00.000-07:00</published><updated>2007-08-27T05:13:58.179-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="Española"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="security tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Stopbadware"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Rebeca La Webmaster - herramientas empleadas (Parte 1 de 3)</title><content type='html'>&lt;div style=&quot;text-align: justify;font-family:trebuchet ms;&quot; &gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&quot;¡¡¡MANTÉN LA CALMA!!!&quot; - Rebeca La Webmaster – Un Caso de estudio de StopBadware, Guía práctica para el Webmaster, - Descripción de las herramientas empleadas (Parte 1 de 3) – Análisis exhaustivo de problemas y cuestiones (Parte 2 de 3) – Evitando problemas en el futuro (Parte 3 de 3) &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Esta es la continuación de &quot;Rebeca La Webmaster, esta es mi historia sin lágrimas ni gloria&quot; Donde describimos el los métodos de resolución del problema, el análisis, herramientas utilizadas y los pasos tomados para evitar problemas futuros. El &quot;nosotros&quot; somos Rebeca (una webmaster principiante) con la ayuda de El Jart, nos hemos asegurado de que El Jart empezó también con estas herramientas &quot;tontas&quot; (de las que a veces ni podía entender los nombres) y de que todo lo que utilizáramos estuviese disponible para todos de manera gratuita – nada comercial. &lt;span lang=&quot;EN-GB&quot;&gt;Recordad que si yo puedo aprender esto, cualquiera puede. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;Introducción&lt;br /&gt;Primero dejadnos empezar por las obviedades, con chequeos regulares de las herramientas disponibles virtualmente es posible evitar que nos marquen en google, podréis encontrar mas abajo la manera de evitarlo. Pero recordad que hasta las páginas más importantes acaban siendo hackeadas o puestas en peligro, por ejemplo AOL o MSN, así que el consejo más importante del la Guía del Autostopista por la Galaxia es &quot;MANTEN LA CALMA&quot;.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Las Herramientas&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Una llamada a la precaución, estas herramientas funcionaron para nosotros, de todas maneras debes buscar la ayuda del host de tu web y sólo hacer este trabajo si tienes un buen antivirus, anti-spyware etc. \n\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Lo que estás tratando de eliminar ¡muerde! \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Así que asegúrate primero de que tu pc está limpio.\n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cspan\&gt; \u003c/span\&gt;\u003cbr\&gt;\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\n1.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Acceso al servidor: sé que suena obvio, pero cuando empecé como webmaster no tenía acceso absoluto ni sabía de que herramientas disponía, así que compruébalo primero, si usas Cpanel o similar muchas de las herramientas de limpieza y comprobación están ahí. \n\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Ejemplo: \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003ca href\u003d\&quot;http://www.cpanel.net/docs/cpanel/\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\n\u003cspan lang\u003d\&quot;EN-GB\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;http://www.cpanel.net/docs\u003cWBR\&gt;/cpanel/\u003c/font\&gt;\u003c/span\&gt;\u003c/a\&gt;\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\n\u003cbr\&gt;\u003cbr\&gt;2.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Firefox y extras– Cómo webmaster tienes que poder ver la web y cómo se llama. Lo que quiero decir es que debes conocer los &amp;quot;scripts&amp;quot;, por ejemplo, puede que uses algún anuncio o banner, al que se llama desde tu site, por ejemplo &amp;quot;cookies&amp;quot; etc. Sólo un aviso a usuarios de firefox y estos extras \n\u003ca href\u003d\&quot;https://addons.mozilla.org/en-US/firefox/browse/type:1\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;https://addons.mozilla.org/en\u003cWBR\&gt;-US/firefox/browse/type:1\u003c/font\&gt;\u003c/a\&gt;  vuestra navegación es mucho más segura, de ti depende si quieres aceptar scripts, cookies y otras descargas. \n&quot;,1] );  //--&gt;&lt;/script&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Una llamada a la precaución, estas herramientas funcionaron para nosotros, de todas maneras debes buscar la ayuda del host de tu web y sólo hacer este trabajo si tienes un buen antivirus, anti-spyware etc. &lt;span lang=&quot;EN-GB&quot;&gt;Lo que estás tratando de eliminar ¡muerde! &lt;/span&gt;Así que asegúrate primero de que tu pc está limpio. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;span lang=&quot;EN-GB&quot;&gt; 1.      &lt;/span&gt;Acceso al servidor: sé que suena obvio, pero cuando empecé como webmaster no tenía acceso absoluto ni sabía de que herramientas disponía, así que compruébalo primero, si usas Cpanel o similar muchas de las herramientas de limpieza y comprobación están ahí. &lt;span lang=&quot;EN-GB&quot;&gt;Ejemplo: &lt;/span&gt;&lt;a href=&quot;http://www.cpanel.net/docs/cpanel/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt; &lt;span lang=&quot;EN-GB&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;http://www.cpanel.net/docs&lt;wbr&gt;/cpanel/&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;&lt;br /&gt;2.      &lt;/span&gt;Firefox y extras– Cómo webmaster tienes que poder ver la web y cómo se llama. Lo que quiero decir es que debes conocer los &quot;scripts&quot;, por ejemplo, puede que uses algún anuncio o banner, al que se llama desde tu site, por ejemplo &quot;cookies&quot; etc. Sólo un aviso a usuarios de firefox y estos extras &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/browse/type:1&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;https://addons.mozilla.org/en&lt;wbr&gt;-US/firefox/browse/type:1&lt;/span&gt;&lt;/a&gt;  vuestra navegación es mucho más segura, de ti depende si quieres aceptar scripts, cookies y otras descargas.  &lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cbr\&gt;\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;a.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\nFirefox – asegúrate de que tienes la ultima versión (preparada para que no ver pop-ups y aceptar las cookies manualmente)\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;b.      Google toolbar (extra) – ayuda a buscar en la red la dirección de cualquier tercero, pero para mi si buscas\u003cspan\&gt;\n  \u003c/span\&gt;&amp;quot;define:sql injection&amp;quot; puedes encontrar la descripción para que te ayude o usar &amp;quot;site:\u003ca href\u003d\&quot;http://anywebsite.com/\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;anywebsite.com\u003c/font\&gt;\u003c/a\&gt;&amp;quot; &amp;quot;inurl:\n\u003ca href\u003d\&quot;http://anywebsite.com/\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;anywebsite.com\u003c/font\&gt;\u003c/a\&gt;&amp;quot; &amp;quot;cache:\u003ca href\u003d\&quot;http://anywebsite.com/\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;anywebsite.com\u003c/font\&gt;\u003c/a\&gt;&amp;quot; para ver mucha más información sobre cualquier web, incluyendo la tuya.\n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cbr\&gt;c.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;McAfee Site Advisor (extra) – para comprobar cualquier web en la que entres especialmente en busca de cualquier tipo de spam o script. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;d.      No-Script (extra) – esta es genial porque puedes navegar por cualquier web con todos los scripts que utilice deshabilitados. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;&quot;,1] );  //--&gt;&lt;/script&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-GB&quot;&gt;a.      &lt;/span&gt; Firefox – asegúrate de que tienes la ultima versión (preparada para que no ver pop-ups y aceptar las cookies manualmente)&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;b.      Google toolbar (extra) – ayuda a buscar en la red la dirección de cualquier tercero, pero para mi si buscas&lt;span&gt;   &lt;/span&gt;&quot;define:sql injection&quot; puedes encontrar la descripción para que te ayude o usar &quot;site:&lt;a href=&quot;http://anywebsite.com/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;anywebsite.com&lt;/span&gt;&lt;/a&gt;&quot; &quot;inurl: &lt;a href=&quot;http://anywebsite.com/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;anywebsite.com&lt;/span&gt;&lt;/a&gt;&quot; &quot;cache:&lt;a href=&quot;http://anywebsite.com/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;anywebsite.com&lt;/span&gt;&lt;/a&gt;&quot; para ver mucha más información sobre cualquier web, incluyendo la tuya. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;c.      &lt;/span&gt;McAfee Site Advisor (extra) – para comprobar cualquier web en la que entres especialmente en busca de cualquier tipo de spam o script. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;d.      No-Script (extra) – esta es genial porque puedes navegar por cualquier web con todos los scripts que utilice deshabilitados. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;e.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;PhProxy (extra) – usando este puedes entrar en cualquier web usando una ip que no es la tuya, de todos modos esto es solo para echar un primer vistazo de forma segura, lo tienes que apagar para ver los &amp;quot;inline scripts&amp;quot; \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;f.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Edit Cookies (extra) – con el puedes ver todos los cookies antes de aceptarlos. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;g.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;DOM Inspector (extra) – te deja inspeccionar una ventana web y sus contenidos. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;h.      Safe cache (extra) – te previene de ataques a la privacidad que utilicen el caché.\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;i.      Key scrambler (extra) – encripta cualquier password que teclees en tu pc para las webs, para el momento en el que los keyloggers se pongan en acción. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;j.      Web developer (extra) – te deja comprobar los scripts reales, en otras palabras, no lo que crees que hay en tu web, si no lo que ve el usuario realmente. \n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;&quot;,1] );  //--&gt;&lt;/script&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;e.      &lt;/span&gt;PhProxy (extra) – usando este puedes entrar en cualquier web usando una ip que no es la tuya, de todos modos esto es solo para echar un primer vistazo de forma segura, lo tienes que apagar para ver los &quot;inline scripts&quot; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;f.      &lt;/span&gt;Edit Cookies (extra) – con el puedes ver todos los cookies antes de aceptarlos.  &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;g.      &lt;/span&gt;DOM Inspector (extra) – te deja inspeccionar una ventana web y sus contenidos.  &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;h.      Safe cache (extra) – te previene de ataques a la privacidad que utilicen el caché.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;i.      Key scrambler (extra) – encripta cualquier password que teclees en tu pc para las webs, para el momento en el que los keyloggers se pongan en acción. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;j.      Web developer (extra) – te deja comprobar los scripts reales, en otras palabras, no lo que crees que hay en tu web, si no lo que ve el usuario realmente. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cbr\&gt;3.      Notepad ++ (block de notas) – utilizando esta simple herramienta puedes descargar texto, html, scripts, archivos log del servidor, SQL y grabarlos para un examen posterior.\n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cspan\&gt; \u003c/span\&gt;\u003cbr\&gt;4.      SmartFTP – hay varios, pero este es el que utilizamos, simplemente porque puedes usarlo en modo seguro y dar o quitar permisos a los archivos, con lo que evitas ser atacado de nuevo.\n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cspan\&gt; \u003c/span\&gt;\u003cbr\&gt;5.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\nWindiff – una utilidad gratuita que comparar los directorios que tienes en el FTP y hacer un backup y/o archivos individuales de tu site en tu pc. \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cbr\&gt;\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;6.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\nEn el servidor (asumiendo que usas PHP &amp; MySQL);\u003cbr\&gt;\u003cbr\&gt;a.      Server Log files – usa tu secure FTP para descargarlos y compruébalos con el editor de texto.\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cspan\&gt; \u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot;\&gt;\u003cbr\&gt;b.      \u003c/span\&gt;\u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\nPHPmyAdmin – de un poco desalentador al principio pero con un poco de lectura \u003ca href\u003d\&quot;http://www.phpmyadmin.net/home_page/docs.php\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;http://www.phpmyadmin.net/home\u003cWBR\&gt;_page/docs.php\u003c/font\&gt;\n\u003c/a\&gt; pronto te harás un experto, en nuestro caso fue vital para descargar y hacer un backup de las bases de datos de la web. Es donde encontramos la mayoría de los problemas que nos podían haber re-infectado. &quot;,1] );  //--&gt;&lt;/script&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;3.      Notepad ++ (block de notas) – utilizando esta simple herramienta puedes descargar texto, html, scripts, archivos log del servidor, SQL y grabarlos para un examen posterior. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;4.      SmartFTP – hay varios, pero este es el que utilizamos, simplemente porque puedes usarlo en modo seguro y dar o quitar permisos a los archivos, con lo que evitas ser atacado de nuevo. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;5.      &lt;/span&gt;Windiff – una utilidad gratuita que comparar los directorios que tienes en el FTP y hacer un backup y/o archivos individuales de tu site en tu pc. &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-GB&quot;&gt;6.      &lt;/span&gt; En el servidor (asumiendo que usas PHP &amp; MySQL);&lt;br /&gt;&lt;br /&gt;a.      Server Log files – usa tu secure FTP para descargarlos y compruébalos con el editor de texto.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;br /&gt;b.      &lt;/span&gt; PHPmyAdmin – de un poco desalentador al principio pero con un poco de lectura &lt;a href=&quot;http://www.phpmyadmin.net/home_page/docs.php&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;http://www.phpmyadmin.net/home&lt;wbr&gt;_page/docs.php&lt;/span&gt; &lt;/a&gt; pronto te harás un experto, en nuestro caso fue vital para descargar y hacer un backup de las bases de datos de la web. Es donde encontramos la mayoría de los problemas que nos podían haber re-infectado. &lt;script&gt;&lt;!-- D([&quot;mb&quot;,&quot;\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;c.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;PhpBB – herramientas para los foros \n\u003ca href\u003d\&quot;http://www.phpbb.com/community/\&quot; target\u003d\&quot;_blank\&quot; onclick\u003d\&quot;return top.js.OpenExtLink(window,event,this)\&quot;\&gt;\u003cfont color\u003d\&quot;#0000ff\&quot;\&gt;http://www.phpbb.com/community/\u003c/font\&gt;\u003c/a\&gt; hay mucha ayuda aquí.\u003cbr\&gt;\u003cbr\&gt;\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\n7.      \u003c/span\&gt;\u003cspan style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;Sentido común\u003cspan\&gt;  \u003c/span\&gt;- quizá la herramienta mas importante mientras Jart me presionaba con lo que &amp;quot;debería haber en una web&amp;quot;: scripts, archivos, en los foros, en las bases de datos SQL, etc. Si veis una llamada a una web que no reconocéis comprobadlo, si algún script llama a la descarga\n\u003cspan\&gt;  \u003c/span\&gt;de alguna aplicación multimedia ¿es la auténtica? Si alguna web o bot entra en tu web ó en tus archivos log cada 10 segundos, ¿por qué lo hace? \u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\nY lo más importante ¿qué lo está llamando? Es realmente simple.\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt; \u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;OK fin de la parte 1 de 3 – para el momento en el que hayais instalado todas las aplicaciones sugeridas estaremos de vuelta con la siguiente entrega, trabajad sobre esta guía. ¿alguna pregunta?\n\u003c/span\&gt;\u003c/p\&gt;\n\u003cp style\u003d\&quot;margin:0cm 0cm 0pt\&quot;\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot; style\u003d\&quot;font-size:9.5pt;font-family:Arial\&quot;\&gt;\u003cspan\&gt; \u003c/span\&gt;\u003cbr\&gt;Rebeca &amp; El Jart\u003c/span\&gt;\u003cspan lang\u003d\&quot;EN-GB\&quot;\&gt;\n\u003c/span\&gt;\u003c/p\&gt;\u003c/div\&gt;\u003cbr\&gt; \u003c/div\&gt;\u003cbr\&gt;\n&quot;,0] );  //--&gt;&lt;/script&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; &lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;c.      &lt;/span&gt;PhpBB – herramientas para los foros  &lt;a href=&quot;http://www.phpbb.com/community/&quot; target=&quot;_blank&quot; onclick=&quot;return top.js.OpenExtLink(window,event,this)&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 255);&quot;&gt;http://www.phpbb.com/community/&lt;/span&gt;&lt;/a&gt; hay mucha ayuda aquí.&lt;br /&gt;&lt;br /&gt;&lt;span lang=&quot;EN-GB&quot;&gt; 7.      &lt;/span&gt;Sentido común&lt;span&gt;  &lt;/span&gt;- quizá la herramienta mas importante mientras Jart me presionaba con lo que &quot;debería haber en una web&quot;: scripts, archivos, en los foros, en las bases de datos SQL, etc. Si veis una llamada a una web que no reconocéis comprobadlo, si algún script llama a la descarga &lt;span&gt;  &lt;/span&gt;de alguna aplicación multimedia ¿es la auténtica? Si alguna web o bot entra en tu web ó en tus archivos log cada 10 segundos, ¿por qué lo hace? &lt;span lang=&quot;EN-GB&quot;&gt; Y lo más importante ¿qué lo está llamando? Es realmente simple.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;OK fin de la parte 1 de 3 – para el momento en el que hayais instalado todas las aplicaciones sugeridas estaremos de vuelta con la siguiente entrega, trabajad sobre esta guía. ¿alguna pregunta? &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;margin: 0cm 0cm 0pt;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;Rebeca &amp;amp; El Jart&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/3654681147802989667/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/3654681147802989667' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/3654681147802989667'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/3654681147802989667'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/mantn-la-calma-rebeca-la-webmater.html' title='Rebeca La Webmaster - herramientas empleadas (Parte 1 de 3)'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-190946562059572993</id><published>2007-08-22T06:03:00.000-07:00</published><updated>2007-08-22T06:07:19.914-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Alexa"/><category scheme="http://www.blogger.com/atom/ns#" term="Amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="BadMal"/><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="ethics"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Stopbadware"/><title type='text'>Alexa to be blacklisted?</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:trebuchet ms;&quot;&gt;So who can you trust on the Internet nowadays? Perhaps the answer lies with the cyberspace citizen democracy.  Alexa, the Web Information Service owned by Amazon, appears to be on the brink of being blacklisted by McAfee’s Site Advisor .&lt;/span&gt;&lt;/span&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Site Advisor uses the basis of its own scanning to judge whether users should be warned of a website dishing out exploits, spam etc. At the moment is shows a green tick, however it also relies upon independent reviewers to judge website experience. At the moment 75% of reviewers are giving Alexa the thumbs down, for consistent; ad-ware, viruses, and spyware.&lt;span style=&quot;&quot;&gt;  &lt;/span&gt;On the anti-virus tests Alexa’s &lt;span style=&quot;&quot;&gt; &lt;/span&gt;toolbar comes up with;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;AhnLab-V3:Dropper/Alexabar.494672&lt;br /&gt;AntiVir:DR/AlexaBar.J&lt;br /&gt;Avast:Win32:Adware-gen.&lt;br /&gt;BitDefender:Adware.Alexabar.L&lt;br /&gt;Ewido:Adware.AlexaBar&lt;br /&gt;FileAdvisor: threat detected&lt;br /&gt;Fortinet:Adware/AlexaBar&lt;br /&gt;F-Prot:W32/AdwareX.CKD&lt;br /&gt;Ikarus:Win32.SuspectCrc&lt;br /&gt;Kaspersky:not-a-virus:AdWare.Win32.AlexaBar.j&lt;br /&gt;McAfee:potentially unwanted program Generic PUP&lt;br /&gt;NOD32v2:Win32/Adware.Alexa&lt;br /&gt;One-Care (MS): Privacy concerns&lt;br /&gt;Panda:Adware/Alexa-Toolbar&lt;br /&gt;Sunbelt:Alexa Toolbar&lt;br /&gt;Symantec:Trackware.Alexa&lt;br /&gt;VBA32:Application.Win32.Adware.Alexa&lt;br /&gt;Webwasher-Gateway:Trojan.AlexaBar.J &lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;So on Site advisor it now shows on the brink of getting the red “X” along with other exploiters, &lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://www.siteadvisor.com/analysis/reviewercentral/?page=onthebrink&amp;showMore=true&quot;&gt;http://www.siteadvisor.com/analysis/reviewercentral/?page=onthebrink&amp;amp;showMore=true&lt;/a&gt; ,&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;So most users know Alexa’s Spybar is primarily BadWare, (ad-ware / spyware) and a real nuisance to uninstall. &lt;span style=&quot;&quot;&gt; &lt;/span&gt;So here is the question, will McAfee and others take the step to give it the red “X”?&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;The possible reason they won’t is because it is one of the big boys on the Internet? – Wonder if the community could tip the scales by also adding their negative views of Alexa’s Spybar as a reviewer try it out &lt;a href=&quot;http://www.siteadvisor.com/sites/alexa.com#reviewercommentssummary&quot;&gt;http://www.siteadvisor.com/sites/alexa.com#reviewercommentssummary&lt;/a&gt; .&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot;  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Wow, just imagine if we could get Amazon and others to come clean and maybe set a good example for others, by changing their spybar. No wonder many webmasters go to StopBadWare (Google’s blacklist forum) to complain about why their website has been flagged, when Alexa just rolls on regardless. &lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/190946562059572993/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/190946562059572993' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/190946562059572993'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/190946562059572993'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/alexa-to-be-blacklisted.html' title='Alexa to be blacklisted?'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-4096460291267438336</id><published>2007-08-19T10:50:00.000-07:00</published><updated>2007-08-22T09:29:05.974-07:00</updated><title type='text'>Rebecca the Webmaster - BadWare Case Study</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Rebecca the Webmaster - this is my story, no tears, no glory...- A&lt;br /&gt;StopBadWare Case Study (English version) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Introduction;&lt;br /&gt;This is a success story for Rebecca and StopBadWare, - no tears, no&lt;br /&gt;glory! This is written by me and &#39;El Jart&#39; to assist other webmasters&lt;br /&gt;and written in a case study format as a step by step guide from a&lt;br /&gt;website getting flagged by Google, not only to the lifting of the&lt;br /&gt;warning, but added measures to hopefully reduce the chances of ever&lt;br /&gt;getting flagged again, with hidden traps for any unwary exploiter in&lt;br /&gt;the future. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;(Note: No staff of StopBadWare or Google was involved, and the review&lt;br /&gt;process was as for any website.) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;This case study is in 3 parts; English language version (this post),&lt;br /&gt;Spanish version, Tech version and descriptions of tools and in-depth&lt;br /&gt;analysis of code and script issues we used. This is to demonstrate how&lt;br /&gt;a newbie webmaster with help from the community, can get it done,&lt;br /&gt;hopefully any webmaster can follow &quot;Rebecca&#39;s Guide&quot; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Backgound;&lt;br /&gt;The specific web domain itself is not relevant for this study; however&lt;br /&gt;the site is a popular Spanish language community fanzine; news,&lt;br /&gt;sharing stories, pictures, multimedia and an active forum. Based in a&lt;br /&gt;small town in Northern Spain, Rebecca started off  2 years ago as a&lt;br /&gt;forum moderator; &quot;without even an internet connection at home but when&lt;br /&gt;she got one her dial-up she was ready to get into de administration,&lt;br /&gt;so “I personally decided to change the website looks, and start&lt;br /&gt;spanking the others to do their job properly. The web site really&lt;br /&gt;started to take off, not just the news section the designing and all&lt;br /&gt;the info was starting to be what it was meant to be, then the problems&lt;br /&gt;started.&quot; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Being Flagged by Google;&lt;br /&gt;The Google warning story... one of the members of the site team was&lt;br /&gt;testing our rank in Google when he found out we were flagged, so&lt;br /&gt;that&#39;s when the story begins... May 3rd 07. We asked Google, who told&lt;br /&gt;us to remove certain code and told us to ask for review in&lt;br /&gt;StopBadWare. After some time trying to clean it myself... I decided to&lt;br /&gt;ask for help at the StopBadWare forum July 28th 07... Lucky me! I&lt;br /&gt;found help from the community!! How I have found out that we did get a&lt;br /&gt;Google mail warning us, but I did not have access to that accounts&lt;br /&gt;till I asked another team member for the passwords and all that stuff,&lt;br /&gt;he doesn&#39;t even know how to enter that accounts I&#39;m not blaming&lt;br /&gt;him for that, so I&#39;m not sure for how long we were flagged &#39;till May&lt;br /&gt;3rd.&quot; Having requested a review the Google flag was clear August 2nd&lt;br /&gt;07... Happy team, site, and users. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;How we fixed it;&lt;br /&gt;The first strange stuff, after reading the StopBadWare guidelines I&lt;br /&gt;could see was a reference in the HTML index page was to iframe ....., relating to some .swf and &#39;RuneScape&#39; and as we do not have such files on the site! I just deleted, but I was not sure if&lt;br /&gt;that was it? &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Found out it is used by hackers to trick users into downloading&lt;br /&gt;malware from a fake Adobe Shockwave Player download site. Prospective&lt;br /&gt;users who stray onto a game site are presented with broken icons in an&lt;br /&gt;attempt to convince them that their copy of Shockwave (if already&lt;br /&gt;installed) isn&#39;t working properly. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Then we found another iFrame src &quot;quickcnt” hidden iFrame in the&lt;br /&gt;Administracion directory there is a file called &quot;index.php&quot; so we got&lt;br /&gt;rid of that too, with two other .swf fake player downloads. Ok I&lt;br /&gt;thought this was all done until &#39;Jart&#39; told me to search all the&lt;br /&gt;server log files for strange activity on the site, after he found them&lt;br /&gt;for me, he was right!  Lots of funny IP addresses (web bots) coming to&lt;br /&gt;call, linked to the stuff I had got rid of but also for the forum. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;So I went to work on the PhpBB forum, cleaned off any spam, and banned&lt;br /&gt;all the IP and domains linked to the spam and the logs. We then also&lt;br /&gt;added a &#39;robots.txt&#39; especially for the forum and patched various php&lt;br /&gt;files for the forum. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Finished I thought, then &#39;El Jart&#39; asked me about the SQL database&lt;br /&gt;files, did not even know where they were. So Jart pushed me again (El&lt;br /&gt;Jart can be more Bad than the BadWare!) what did we find? A forum that&lt;br /&gt;I did not even know existed. This had SQL injections, with only spam&lt;br /&gt;addressed to bad websites. Also administrators with passwords for the&lt;br /&gt;whole site, who had nothing to do with the site, and spam that,&lt;br /&gt;attached its self to any proper post on the real forum. This is how we&lt;br /&gt;got hacked in the first place and if we had not dug down deep enough,&lt;br /&gt;we could have easily been infected again. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Conclusions and a happy ending;&lt;br /&gt;When we first found out we were flagged by Google I was first&lt;br /&gt;frustrated and after getting rid of the first bad iFrame, I was&lt;br /&gt;annoyed we had to wait. Thanks for the StopBadWare forum and really&lt;br /&gt;finding out what was wrong and really fixing it, I can only tell any&lt;br /&gt;other webmaster it was worth the wait. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;So check your website if you get flagged or even better check your&lt;br /&gt;website before you get flagged - check; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;1.      For any iFrame code especially where it has the name of a website&lt;br /&gt;you do not know, and says &quot;hidden&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;2.      In any PHP or other files for this, as well as any calls for&lt;br /&gt;downloads of multimedia players, PDF, or other files you do not&lt;br /&gt;recognize. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;3.      Look at your server log files, for all contact with your web site&lt;br /&gt;is within them, might take a bit of learning but worth it. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;4.      Check these database files (SQL) for anything unusual. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;5.      Go to the StopBadWare forum and ask, I did and it helped me. For a&lt;br /&gt;little more practice, El Jart is going to take me on some of his next&lt;br /&gt;&quot;help visits&quot; then I will assist other webmasters! &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;So in all &quot;a few tears but a lot of glory&quot;, one further happy ending&lt;br /&gt;is, Jart showed me how to add a few further &quot;patches&quot; which he made me&lt;br /&gt;promise not to tell anyone, but apparently they are &quot;BadWare Hacker&quot;&lt;br /&gt;traps, which if someone tries to hack our site again, their &quot;bot&quot; goes&lt;br /&gt;back to its dark place with a bad headache ;-)&lt;br /&gt;Hope this helps others. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Rebecca AKA &quot;The BadWare Avenger&quot; &amp;amp; with an El Jart assist. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/4096460291267438336/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/4096460291267438336' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4096460291267438336'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4096460291267438336'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/rebecca-webmaster-badware-case-study.html' title='Rebecca the Webmaster - BadWare Case Study'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-5085142227237197223</id><published>2007-08-19T10:39:00.000-07:00</published><updated>2007-08-22T09:29:52.553-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Española"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Stopbadware"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Rebeca la Webmaster – esta es mi historia, ni lágrimas ni gloria</title><content type='html'>&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Rebeca la Webmaster – esta es mi historia, ni lágrimas ni gloria… un&lt;br /&gt;caso de estudio de Stopbadware. (Version Española) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Introducción;&lt;br /&gt;Esta es una historia de éxito de Rebeca y StopBadware – sin lágrimas&lt;br /&gt;ni gloria, escrita por mi y “El Jart” para ayudar a otros webmasters y&lt;br /&gt;escrito paso a paso desde una web con aviso de Google “este sitio&lt;br /&gt;puede dañar su equipo” y no solo conseguir deshacernos de el si no&lt;br /&gt;añadir medidas para reducir las oportunidades de volver a tener un&lt;br /&gt;aviso con trampas ocultas para cualquier ataque indeseable en el&lt;br /&gt;futuro. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;(Nota: Ningún miembro del personal de StopBadware o google fue&lt;br /&gt;involucrado y el proceso de revisión fue el mismo que para cualquier&lt;br /&gt;website). &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Este caso de estudio consta de tres partes, versión inglesa, versión&lt;br /&gt;española (este post) versión técnica y descripción de las herramientas&lt;br /&gt;y análisis detallado del código y el script que utilizamos.&lt;br /&gt;Es para demostrar que un webmaster nuevo con un poco de ayuda de la&lt;br /&gt;comunidad puede conseguirlo, y cualquiera puede seguir la “Guía de&lt;br /&gt;Rebeca” . &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Historia;&lt;br /&gt;El dominio de la web no es importante para este estudio, de todos&lt;br /&gt;modos hay que decir que es un Fanzine, una comunidad llena de&lt;br /&gt;noticias, fotos, multimedia e historias varias, así como un foro&lt;br /&gt;activo. Empecé hace dos años como moderadora del foro, no tenía&lt;br /&gt;conexión a internet en casa por lo que no podía aspirar a mucho más,&lt;br /&gt;cuando la conseguí comencé mi pequeña revolución, instando a los demás&lt;br /&gt;a completar un trabajo que estaba a medias. Cuando todo empezaba a&lt;br /&gt;tener “cara” empezaron los problemas.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;El aviso de Google;&lt;br /&gt;La historia del Google Warning... uno de los miembres del equipo&lt;br /&gt;estaba testeando nuestro webranking en google cuando se dio cuenta de&lt;br /&gt;que teníamos ese indeseable aviso “este sitio puede dañar su equipo”&lt;br /&gt;ahí es donde la historia empieza, 3 de Mayor de 2007, preguntamos en&lt;br /&gt;google y nos dijeron que borrásemos cierto código y que pidiésemos&lt;br /&gt;review en badware, después de un mail en el que nos decían que&lt;br /&gt;estábamos limpios y que el aviso sería borrado pronto empezaron los&lt;br /&gt;verdaderos quebraderos de cabeza, ya que día a día el aviso seguía&lt;br /&gt;allí… después de bastante tiempo intentando limpiar los códigos yo&lt;br /&gt;misma decidí pedir ayuda en el foro de StopBadWare el 28 de Julio,&lt;br /&gt;afortunadamente encontré ayuda de la comunidad enseguida! &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Podría haberme dado cuenta del aviso de google antes, nos habían&lt;br /&gt;mandando un correo al mail de la web, pero hasta hace relativamente&lt;br /&gt;poco yo no tenía acceso a esas cuentas, hasta que no le pedí las&lt;br /&gt;claves a otro miembro del equipo, él tampoco tenía muy claro cómo se&lt;br /&gt;accedía a esas cuentas, con lo cual no le culpo por ello, por lo que&lt;br /&gt;no sé exactamente desde cuando teníamos el aviso.  Finalmente nos&lt;br /&gt;deshicimos del google warning el 2 de Agosto y nos quedamos&lt;br /&gt;“tranquilos”. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Cómo lo solucionamos:&lt;br /&gt;La primera cosa extraña, después de leer las guías de StopBadware vi&lt;br /&gt;que había referencias en  mi html principal (index) a un iframe .....,&lt;br /&gt;Relacionado con un .swf y &#39;RuneScape&#39; cómo no teníamos esos archivos&lt;br /&gt;en nuestra web simplemente lo borramos, pero no estaba segura de si&lt;br /&gt;era eso o no. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Averiguamos que es algo que los hackers usan para engañar a los&lt;br /&gt;usuarios y que descarguen un Adobe Shockwave Player falso, los&lt;br /&gt;usuarios normalmente acaban en una páguna de juegos con iconos rotos,&lt;br /&gt;haciéndoles creer que su copia de Shockwave, si es que la tienen&lt;br /&gt;instalada, no funciona correctamente. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Después encontramos otro iFrame src &quot;quickcnt&quot;  escondido en el index&lt;br /&gt;del directorio de administración, con otras dos llamadas a la descarga&lt;br /&gt;de .swf falsos. Pensé que eso era todo cuando “Jart” me dijo que&lt;br /&gt;ojeara los archivos log buscando actividad extraña, después de que él&lt;br /&gt;buscase, me di cuenta de que era cierto, muchas IPS raras (web bots)&lt;br /&gt;haciendo llamadas, linkeando a cosas que ya había eliminado y también&lt;br /&gt;al foro. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Así pues, me dirigí al foro PHPbb, limpié todo el spam y baneé las IPS&lt;br /&gt;y los dominios linkeados a spam y los logs, añadimos un robots.txt&lt;br /&gt;especialmente para el foro y parcheamos varios archivos php del foro. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Pensé que habíamos acabado, pero otra vez &#39;El Jart&#39; me preguntó sobre&lt;br /&gt;la base de datos SQL, no sabía donde estaban. Así que me instó de&lt;br /&gt;nuevo (A veces El Jart es peor que el propio badware) ¿qué&lt;br /&gt;encontramos? Un foro que no sabía que existía que tenía inyecciones&lt;br /&gt;SQL, con sólo spam y links a sites de dudosa reputación. También&lt;br /&gt;administradores con passwords para todo el site que ya no tenían que&lt;br /&gt;ver con él, y spam que se adjuntaba a algún post del foro real. Esa es&lt;br /&gt;la manera en la que nos hachearon la primera vez, y si no hubiéramos&lt;br /&gt;investigado a fondo hubiéramos podido ser infectados fácilmente otra&lt;br /&gt;vez. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Conlusiones y final feliz;&lt;br /&gt;Cuando nos dimos cuenta de que teníamos el aviso de google estaba un&lt;br /&gt;poco frustrada y después de borrar el primer iFrame me molestaba la&lt;br /&gt;espera. Gracias al foro de StopBadWare he averiguado cual era el&lt;br /&gt;problema real y se ha solucionado de verdad, solo puedo decir que la&lt;br /&gt;espera ha merecido la pena.&lt;br /&gt;Así que, si tenéis un aviso de google ó mejor, mirad vuestras webs&lt;br /&gt;periódicamente antes de que lo tengáis, en busca de: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;1.      Cualquier iFrame, especialmente si va acompañado de el nombre de un&lt;br /&gt;site que no conocéis y que diga &quot;hidden&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;2.      en cualquier PHP ú otros archivos por la misma razón, así como&lt;br /&gt;cualquier llamada para descargar reproductores multimedia, PDF ó&lt;br /&gt;cualquier archivo que no reconozcáis. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;3.      echad un vistazo a los archivos log, buscando cualquier contacto&lt;br /&gt;extraño con vuestro site que se encuentre en ellos, os llevará un poco&lt;br /&gt;saber descifrarlo pero merece la pena. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;4.      Echad un vistazo a los archivos de la base de datos (SQL) buscando&lt;br /&gt;cualquier cosa fuera de lo normal. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;5.      Id al foro de StopBadWare y preguntad, a mi me ha ayudado mucho.&lt;br /&gt;Para que adquiera un poco más de práctica, el Jart me llevará en sus&lt;br /&gt;“próximas visitas de ayuda” después yo misma ayudaré a otros&lt;br /&gt;webmasters! &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Así pues, después de todo &quot;algunas lágrimas pero mucha gloria”, un&lt;br /&gt;nuevo final feliz, Jart me ha enseñado cómo añadir algunos parches más&lt;br /&gt;pero me ha hecho prometer que no se lo diré a nadie, aparentemente son&lt;br /&gt;trampas para &quot;BadWare Hacker&quot;, por lo que si alguien intenta hackear&lt;br /&gt;nuestro site otra vez, su “bot” vuelve a casa con su con un mal dolor&lt;br /&gt;de cabeza. ;-) &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Espero que esto os ayude. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt;Rebeca AKA &quot;The BadWare Avenger&quot; con la ayuda de El Jart. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/5085142227237197223/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/5085142227237197223' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/5085142227237197223'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/5085142227237197223'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/rebeca-la-webmaster-esta-es-mi-historia.html' title='Rebeca la Webmaster – esta es mi historia, ni lágrimas ni gloria'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-8720062041528163263</id><published>2007-08-18T11:54:00.000-07:00</published><updated>2007-08-22T09:30:37.671-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ethics"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="webmasters"/><title type='text'>Google Blacklisting and Ad-Networks – Ethical Choice for a Webmaster</title><content type='html'>&lt;p  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Having you website “flagged” by Google is very frustrating, but is it Google who is punishing you? &lt;/span&gt;&lt;span style=&quot;;font-size:85%;&quot; &gt; &lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;For many webmasters the problem is caused by &quot;Ad-Networks&quot; they subscribe, here is an illustration; “You buy a gun, the gun is picked up, fired and hurts someone, whose responsibility is it, yours or the gun manufacturer?&quot; - Answer = 100% your responsibility &lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Did you need the gun in the first place? Were there better methods available? Did you check out the manufacturer / ad-network in this case by checking the experience of other users, particularly those end users who have had their PC’s screwed up and complained to Google?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt; &lt;!--[if !supportLineBreakNewLine]--&gt; &lt;!--[endif]--&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;There are many complaints on forums all over the Internet. Most end users, me included, are thankful Google is at least providing some warning. Why should the user put up with this annoying and nearly impossible to remove adware - from your site? &lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;So take action against the real people who caused you the problem; as examples have you gone back to Casale Media or ValueClick or many others and asked them, (a) why does their code get you into these problems, and (b) what are they going to do about it? &lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;We all have moral or ethical choices; your web site is delivering to the end user so 100% your responsibility. If you and others decide not to use Casale Media and ValueClick, then they would be out of business or might change their bad methods. &lt;/span&gt;&lt;/p&gt;  &lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Webmaster, &quot;as you did buy the gun&quot;; Are the Ad-Network’s methods good for end users? When did you know they caused issues (adware / spyware / spam) for end users, only because Google flagged you? How much did the $$$ factor made you decide to use them?&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/8720062041528163263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/8720062041528163263' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/8720062041528163263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/8720062041528163263'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/google-blacklisting-and-ad-networks.html' title='Google Blacklisting and Ad-Networks – Ethical Choice for a Webmaster'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-5386152297424513551</id><published>2007-08-18T10:34:00.000-07:00</published><updated>2007-08-22T09:30:54.007-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security tools"/><title type='text'>BadWare Hunter&#39;s Tools</title><content type='html'>&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Tools for the BadWare Hunter&lt;a href=&quot;http://sectools.org/&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-weight: bold; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://sectools.org/&quot;&gt;Top 100 security tools&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-weight: bold; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://sectools.org/web-scanners.html&quot;&gt;Top 10 Web vulnerability scanners&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-weight: bold; font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Fyodor&quot;&gt;Info on author Fyodor of sectools&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Joomla! Administrators, advice &amp; tools&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://help.joomla.org/component/option,com_easyfaq/task,view/id,167/Itemid,268/&quot;&gt;&lt;b&gt;Joomla! Administrator&#39;s Security Checklist&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://forum.joomla.org/index.php/topic,99342.0.html&quot;&gt;&lt;b&gt;How to find exploits using the *NIX shell&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-family: trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://help.joomla.org/component/option,com_easyfaq/task,view/id,100/Itemid,268/&quot;&gt;&lt;b&gt;Help! My site&#39;s been compromised. Now what?&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/5386152297424513551/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/5386152297424513551' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/5386152297424513551'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/5386152297424513551'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/badware-hunters-tools.html' title='BadWare Hunter&#39;s Tools'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4681088955535167126.post-4909833712152162280</id><published>2007-08-18T10:17:00.000-07:00</published><updated>2007-08-22T09:31:13.916-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badware"/><category scheme="http://www.blogger.com/atom/ns#" term="internet security"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>BadWare Activist</title><content type='html'>&lt;p  align=&quot;justify&quot; style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_0&quot;&gt;Malware&lt;/span&gt; or &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_1&quot;&gt;badware&lt;/span&gt; or whatever you want to call it, so another Blog?&lt;br /&gt;&lt;br /&gt;I and millions of others (yes millions!) have been &quot;burgled&quot;, yes that is the right word, and these burglars have either:&lt;/span&gt;&lt;/p&gt;&lt;ul  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Come onto my property without permission and attempted to steal or maybe have stolen for all I know. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Thought it is OK to sell me a product or service and then also steal or attempt to steal. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Initially as an invited guest, but without my permission or even the courtesy to ask, plant a bug which is designed to spy and then ultimately steal from me. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p  align=&quot;justify&quot; style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;This has wasted my valuable time and cost me a lot of money over the years. So I am going to stop being an ongoing victim, get the real answers many of us Internet an PC users are looking for. For example who can you even report this crime to or will take action? I want to really find the answers, whistle blow on the burglars and badly behaved guests. Do something about it and encourage others that will.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This Blog, is not associated with any vested commercial interest:&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul  style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It &quot;is&quot; a place which will not be pretty or diplomatic, it is in layman’s terms going to question, point fingers, get and provide answers, and seek justice. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It &quot;is&quot; a record and resource of firstly how to find out if you have been burgled, see some of the burglars tools, and what to do about &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_2&quot;&gt;Malware&lt;/span&gt; - &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_3&quot;&gt;Badware&lt;/span&gt; or whatever is the current flavor of the month key word, you discover lurking there. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It &quot;is&quot; a place where the question is asked, with hopefully some answers, not only about how to remove or fix &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_4&quot;&gt;malware&lt;/span&gt; / &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_5&quot;&gt;badware&lt;/span&gt;. It is about how to proactively prevent it, or even more importantly find out and get back at whoever sent it you. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It &quot;is&quot; a place where there will be a debate on the industry ethics and philosophy on the cause to this disease. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;It &quot;is not&quot; a place for selling or reselling; but if you know of the latest gadget / tool as a solution that &quot;really works&quot; then provide advice. &lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p  align=&quot;justify&quot; style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Well, not just as a good sound bite &quot;the more I know the less I understand&quot; about &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_6&quot;&gt;malware&lt;/span&gt;, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_7&quot;&gt;badware&lt;/span&gt;, hacks, viruses, &lt;span class=&quot;blsp-spelling-error&quot; id=&quot;SPELLING_ERROR_8&quot;&gt;spyware&lt;/span&gt;, or the myriad of other terms. As someone who is supposed to have reasonable expertise on all of this, the more in depth I have researched the who and why, the more I have realized we are all missing the point. Of the more recent discoveries, ongoing research, forensic analysis, and information passed to me, has already revealed some surprising if not disturbing answers, that is another reason to use this blog, to avoid some of the vested interest. &lt;/span&gt;&lt;/p&gt;&lt;p  align=&quot;justify&quot; style=&quot;font-family:trebuchet ms;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;You a victim as well? Got some answers? Then add a comment, add your frustration, try and tell us there is no problem, provide advice, let us whistle blow on the; who and why. &lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;BadMalWeb 2007&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badmalweb.blogspot.com/feeds/4909833712152162280/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4681088955535167126/4909833712152162280' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4909833712152162280'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4681088955535167126/posts/default/4909833712152162280'/><link rel='alternate' type='text/html' href='http://badmalweb.blogspot.com/2007/08/badware-activist.html' title='BadWare Activist'/><author><name>HostExploit</name><uri>http://www.blogger.com/profile/15380343022241343709</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>