473,395 Members | 1,999 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

my web site has been hacked

I've been running a decent-sized content site (about 500 unique visitors a day) for about 2 years now. This morning I found the site was hacked -- by Scorpia boy with message :I love you Arwa...the hacker pretty much replaced all php and htm/html files with his own message saying "this site was defaced." He did not change or delete any other types of files. Nor did he touch the mySql database.
I'm trying to determine how we was able to hack in. I implemented a phpBB message board a few weeks ago and based on other threads on these forum, that seems to have been the problem. But is he was able to get my username and password, I'm wondering why he did not delete the mySQL database. It's a given that I have to change my username/password and I will also remove phpBB from my site. But what else do I need to look out for to ensure that this doesn't repeat itself?

I would appreciate any and all advice.
Feb 5 '12 #1
1 1801
did u use cgi script in web site if yes then it can be easily hacked because these scrips are located in cgi-bin directory and hacker can download to steal password of password protected sites
Feb 5 '12 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

6
by: Bob Bedford | last post by:
My database suddently dissapeared from my ISP. I've logged in and the database doesn't exist anymore. I don't know anything about website hacking, so my code is possibly open for hackers. ...
0
by: oi | last post by:
http://www.bayerdiag.com/index.cfm is a financial PR site clicking on "diabetes blah blah" links on various sites, just sends one on a multi- branching pseudo-circular goose chase. (just as...
1
by: rerdavies | last post by:
OS: WIndows Server 2003. Currently logged in user is running with German(German) regional settings. Code fragment: System.Globalization.CultureInfo culture = new...
5
by: David Carter | last post by:
Hello I switched my computer on today and found that a new login of "ASP.net" had been added, it was a full priviledge account. Can anyone tell me what has happened? I have no idea what ASP is so...
8
by: Oski | last post by:
Hello, our server got hacked through a security hole in an open source php chat script. (nothing new so far, ok!) This chat script allowed the user to create a new php script on our server,...
4
by: Wong Yung | last post by:
Hi guys, I recently noticed this strange script appearing on my webpage. I know I didn't put it there because I hand-coded it. Someone told me it looks like javascript and it looked like I...
4
Tarantulus
by: Tarantulus | last post by:
Hi guys, I've been hacked. my homepage has had <script> tage inserted into it pointing to a russian site with a trojan... only problem is I don't know how, and don't know where to start...
7
by: alique | last post by:
This is an annoying situation that we are in at the moment and we are in need of some quick help here please. We have a web site that uses PHP scripts in the shopping cart. There is also an...
1
by: lion cave | last post by:
Hello gud day! I have a problem to a work. Our sister company was hacked their yahoo email by someone from nigeria. i wud like to ask how to get back the yahoo email of our sister company...
3
by: Kirsty McManus | last post by:
Hi there - I've been designing websites for a few years... but I'm self taught so I'm sure there's a lot of stuff I've missed out on. I design my sites from scratch and usually install a basic...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.