I will go through the experience and the next thing that should be done to stop them;
1. Over at the Joomla! / Extension / project.
2. Over use of vulnerable extensions / themes, and not from the time
3. Over helping the stolen information and login / weak
4. Over use of the software / server vulnerable old - Apache, PHP, MySQL.
5. Over the use of web server configuration
6. Over the full Health Management and Joomla on the same server
7. Over the wrong permissions Joomla
8. Over by the malware on the local PC can access the enemy's health
The patch released on July 31 , 2013 relating to the Joomla version 2.5.13 and 2.5.x before , and Joomla 3.1.4 and earlier versions 3.x. Joomla bug found by Versafe web safe and simple vulnerabilities are applied . Joomla version 2.5.14 and 3.1.5 . prepare and submit an unprivileged user to upload files live . PHP adding a " . " ( Tau ) at the end of the file name only PHP .
Back Joomla 2.5.x and 3.x versions , and one can access the media manager to download and execute code by a nurse at the end of the file name you want to run . For sites powered by Joomla version does not support ( 1.5.x and quick Google search shows that there are thousands of these sites and online 1.5.x ) , not the enemy after the data on the server for this to work with Joomla .
Acccording to the leader , and one - Versafe founder Ayal Gruner , in thousands of Phishing and malware killed in the consumer finance 30 + Umea in the first half of 2013 , the host Joomla based site 57 percent .
" What we saw last few months it is important to use a cheater can use the site to host the drive - Phishing babys killed , " said Gruner . He said the company received more than -100 in use to have accepted the malicious JavaScript that uses the Key bank account Trojan to help change the online fraud . Gruner said the release of the company using Joomla in early June .
Open - management system for easy distribution more content - can be put power in the hands of the tax that apply specifically to house whatungakaretao website . Earlier this month , warned as the safety of Arbor Networks found whatungakaretao website called " Fort dance " in Joomla and WordPress site is approved . Prior to this year , security firm Incapsula have found backdoored malicious code over 90,000 websites powered by WordPress .
SQL-i Knowledge
reiluke SQLiHelper 2.7:http://filetram.com/download/file/4390169166/sqlihelper-2-rar
Joomla! Query Knowledge
http://www.site.com/index.php?option=com_idoblog&view=idoblog&Itemid=22
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1--
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
http://www.site.com/index.php?option=com_user&view=reset
http://www.site.com/administrator/
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.