• Resolved Ron Ashman

    (@fakurkr)


    Hi,

    I got a tar file with a supposed WP site. Since I’m a noob I didn’t understand at first what all the folders meant.

    The root had this:
    [.] [..] addons [bandwidth] [counters] [cp]
    [cron] digestshadow [dnszones] [domainkeys] [fp] has_sslstorage
    [homedir] homedir_paths [httpfiles] [locale] [logs] [meta]
    [mm] [mma] [mms] [mysql] [mysql-timestamps] mysql.sql
    nobodyfiles pds proftpdpasswd [psql] quota [resellerconfig]
    [resellerfeatures] [resellerpackages] sds sds2 shadow shell
    [ssl] [sslcerts] ssldomain [sslkeys] [suspended] [suspendinfo]
    [userconfig] [userdata] [va] [vad] version [vf]

    Anyway, I managed to find the “public html” folder with the WP files as well as the SQL tables. I think I know how to run this in my local server (xampp).

    The problem is that a few weeks ago before learning about xampp I uploaded this to an online free server and my account got suspended stating the site has a virus or php exploit. They pointed out a specific file, and that’s when they terminated the ftp session.

    I only found online tools, to scan sites that are online. Is there any way I can scan -and clean- this site? Or how could I start fresh without losing data?

    Thanks a lot in advance.

Viewing 6 replies - 1 through 6 (of 6 total)
  • Jason King

    (@jasoncharlesstuartking)

    I use the WordFence plugin to scan sites/themes/files etc for dodgy stuff. There’s also Sucuri, and others.

    You can definitely install WordFence on a local machine.

    Thread Starter Ron Ashman

    (@fakurkr)

    Hey Jason,

    THANKS for replying.

    I understand I could do that while running the site. Pardon me if I’m wrong, but I’m afraid something bad might happen if I run a site with a virus/php exploit. I would have to run it in order to install the plugin.

    Isn’t there some kind of scanner for WordPress installations?

    If not, maybe I should just run it in a sandbox.

    Thanks again.

    Jason King

    (@jasoncharlesstuartking)

    Thread Starter Ron Ashman

    (@fakurkr)

    Hey thank you for answering!

    It was extremely helpful to read that.

    I found some of the malicious code they’re referring to (like base and decode64) and modifications to the htaccess file. It’s in oh so many files and so messed up that I can’t even start to correct it, specially because I’m not an expert on PHP.

    So I’m going to write to one of the authors of what I read to ask for an estimate on how much that would cost. If there’s anyone you would recommend yourself, just let me know.

    Thanks again for your help!

    Jason King

    (@jasoncharlesstuartking)

    If the malicious code is in WordPress, just reinstall it.

    If it’s in plugins, download them afresh.

    If it’s in the theme and you’ve not made customisations, just download and reinstall the theme.

    If you’ve modified the theme, yeah good luck! Can’t really recommend anyone but there’s always https://jobs.wordpress.net/

    Thread Starter Ron Ashman

    (@fakurkr)

    Thanks. I did not see it that way. I will look into this next weekend.

    Thanks again, really!

Viewing 6 replies - 1 through 6 (of 6 total)
  • The topic ‘Scan offline site for exploits’ is closed to new replies.