Visit Our UNIX and Linux User Community


Plesk Server Hacked - How to Backup


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Plesk Server Hacked - How to Backup
# 1  
Old 09-20-2009
Error Plesk Server Hacked - How to Backup

Hello!

First of all: I am a newbie. Smilie Smilie

I have a CentOS 64bit server with Plesk Panel 8.6.
And have been hacked. Smilie

After many tries and support tickets, I am configuring a new server, with Suse 11 and Plesk 9.2.

I know that Plesk 8.6 have a backup utility (Parallels Plesk Control Panel 8.6 for Linux/Unix Backup and Restore Utilities Administrator's Guide)

But I have some unclear doubts:
1. Is it safe use restore utility? It will restore the license too, but I want to use the newer license, not the old one.
2. How can I backup everything from my old server to the newer? Including e-mails (qmail), DB (MySQL) and domains files and configurations? Does anyone have experience with this?
3. How can I send the files/backup from one server to another in a quick way? I simply can't download-upload for 2 reasons:
3.a) It's about 200GB of files
3.b) I didn't have enought time

If anyone know anything, please help me.

I am with this trouble about 2 days and after the attack I have only SSH access to the server.
The Plesk Panel don't load.

Thank you very much for your attention,

Miguel Koscianski Vidal
# 2  
Old 09-20-2009
Hi,

I too have faced these type of hack issues from my webhosting servers. Which is quite natural that we cannot avoid. So, now you are in a loop.
1) Do you have an local backup or else do you have a separate server for the backups?
2) What is the format of the backup files?
3) You can use the Netcat command to transfer the files from one server to another. Here below the link

A Unix Utility You Should Know About: Netcat - good coders code, great reuse

Or else you can use the rsync command to transfer the files from one server to another in a quite time rather than upload and download.
4) I hope that every thing is been clear on the documentation, on how to restore from the backup.
# 3  
Old 09-20-2009
Bug Backup

Quote:
Originally Posted by gsiva
Hi,

I too have faced these type of hack issues from my webhosting servers. Which is quite natural that we cannot avoid. So, now you are in a loop.
Thank you very much for your reply, gsiva.
Quote:
Originally Posted by gsiva
1) Do you have an local backup or else do you have a separate server for the backups?
No. I didn't have any backup.
Quote:
Originally Posted by gsiva
2) What is the format of the backup files?
If I create one now with Plesk Backup Utility, it has a particular format.
Quote:
Originally Posted by gsiva
3) You can use the Netcat command to transfer the files from one server to another. Here below the link

A Unix Utility You Should Know About: Netcat - good coders code, great reuse

Or else you can use the rsync command to transfer the files from one server to another in a quite time rather than upload and download.
4) I hope that every thing is been clear on the documentation, on how to restore from the backup.
What do you recommend to me: Netcat or rsync?
Which is the fastest? Which is the most secure?

Do you know how to manually backup everything of my server?
In a way that I can only copy the files to the new server and it will run like are running now.

Thank you very much,

Miguel Koscianski Vidal
# 4  
Old 09-21-2009
Hi,

You can make use of the rsync command to transfer the files. which I recommand. The speed of the transfer depends of your network issues.

You can make use of the rsnap backup tool which is more user friendly to backup the files internally. The below link will help you ..

How To Backup Local Unix Host Using rsnapshot rsync Utility (link removed)

let me know if you are in need of any further clarifications.

Regards
Siva
 

Previous Thread | Next Thread
Test Your Knowledge in Computers #711
Difficulty: Easy
The earliest computing machines had fixed programs.
True or False?

6 More Discussions You Might Find Interesting

1. Cybersecurity

Server hacked on known port

Hi, There is a recent case whereby it was reported that one of the production servers was hacked on port 1521. However, I am not sure how this was possible, as I checked that the OS firewall (iptables) is on : # /etc/init.d/iptables status Table: nat Chain PREROUTING (policy ACCEPT) num ... (7 Replies)
Discussion started by: anaigini45
7 Replies

2. UNIX for Dummies Questions & Answers

Adding plesk superuser from SSH

I'm trying to add a superuser (admin) to plesk from SSH (I have root access). Can this be done? I have search over the web but did not find any solution to my problem. My version is Plesk 9.3 (0 Replies)
Discussion started by: galford
0 Replies

3. UNIX for Dummies Questions & Answers

Plesk 9.5.4 CentOS 5 how to view log files?

Hello i have Plesk 9.5.4 CentOS 5 and after updating to 9.5.4 plesk told me there were some errors and to view a log file. Some problems occured during upgrade. You need to * * check log file * * ... (0 Replies)
Discussion started by: basslion
0 Replies

4. Shell Programming and Scripting

rsync backup mode(--backup) Are there any options to remove backup folders on successful deployment?

Hi Everyone, we are running rsync with --backup mode, Are there any rsync options to remove backup folders on successful deployment? Thanks in adv. (0 Replies)
Discussion started by: MVEERA
0 Replies

5. Shell Programming and Scripting

running Cron job in Plesk

I have a script to delete unwanted cookies from some Curl jobs we are doing find /tmp -name 'CURLCOOKIE*' -print0 | xargs -0 rm this works great when I am logged on as root in the shell, now I have to put it into a cron job in Plesk. When I do that it does not work. I think the directory... (0 Replies)
Discussion started by: vaene
0 Replies

6. Cybersecurity

How to know when you've been hacked

One of the most important ways to keep tou machine secure is to know when it has been broken into. The less time hackers have on your system, the less they can do to it, and the greater you chancens of kicking them off and repairing the damage. The more sophisticated the hacker, the less likely... (8 Replies)
Discussion started by: binhnx2000
8 Replies

Featured Tech Videos