{"id":1015,"date":"2013-11-19T09:42:37","date_gmt":"2013-11-19T15:42:37","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1015"},"modified":"2015-10-21T13:06:12","modified_gmt":"2015-10-21T18:06:12","slug":"3-signs-that-your-web-servers-security-has-been-compromised","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/3-signs-that-your-web-servers-security-has-been-compromised\/","title":{"rendered":"3 Signs Your Web Server\u2019s Security has been Compromised"},"content":{"rendered":"<p><a title=\"\" href=\"\/blog\/wp-content\/uploads\/2013\/11\/web-server-security.jpg\" target=\"\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1017\" style=\"margin-right: 15px; border: 5px solid slateblue;\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/web-server-security-300x225.jpg\" alt=\"Web Server Security - Hackers\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/web-server-security-300x225.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/web-server-security.jpg 965w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><span style=\"color: #696969;\">More than ever, businesses have to be careful of attacks on servers and business networks to ensure that their data, and that of their customers\u2019, are fully protected. This is especially true of sensitive data such as credit card and personal details, especially as a failure to protect this could incur a hefty fine when it comes to <\/span><a href=\"http:\/\/www.isaca.org\/Journal\/archives\/2009\/Volume-2\/Pages\/What-Every-IT-Auditor-Should-Know-About-IT-Audits-and-Data.aspx\" target=\"_blank\" rel=\"nofollow\"><span style=\"color: #696969;\">getting your audits<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"color: #696969;\"> carried out.<\/span><\/span><\/span><\/p>\n<h2><\/h2>\n<h2><span style=\"color: #008000;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Tips to Help to Check out Web Server Integrity<\/strong><\/span><\/span><\/span><\/h2>\n<p><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><span style=\"color: #696969;\">Attacks on servers happen, and unfortunately, all too frequently \u2013 so for any anyone out there who is suspicious that the integrity of their <\/span><a href=\"\/servermonitor\/?ref=blog\"><span style=\"color: #696969;\">web server<\/span><\/a><span style=\"color: #696969;\"> may have been compromised \u2013 here are a few tips on how you can check it out.<\/span><\/span><\/span><\/p>\n<h2><span style=\"color: #008000;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Sitting Ducks<\/strong><\/span><\/span><\/span><\/h2>\n<p><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Generally speaking, web servers pose easy targets to hackers. They are online most of the time and they provide a gateway to the rest of the internal computer network. A piece of malware can be dumped anywhere in the network, do its evil deed and cause appropriate mayhem. Then it can be detected and removed. But if the way that the hacker got in via the server isn\u2019t spotted, it\u2019s oh so easy for the hacker to get in again to cause more trouble. Not to mention what he actually gets up to while he has the access.<\/span><\/span><\/span><\/p>\n<h2><span style=\"color: #008000;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>#1: Beware of Web Shells<\/strong><\/span><\/span><\/span><\/h2>\n<p><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Web shells are a method that hackers use to get executable files into someone else\u2019s computer network. They are \u201cdelivered\u201d over the web and are usually text files that have an appropriate extension (php or cmd.aspx) that coincides with the extension(s) used by the host server. Once inserted into the server, by viewing the web shell, the hacker can then see the code he\/she needs in order to be able to talk to the underlying system.<\/span><\/span><\/span><\/p>\n<h2><span style=\"color: #008000;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Compromised Web Shell Checks<\/strong><\/span><\/span><\/span><\/h2>\n<p><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Here are a few tell-tale signs to check for that will indicate your system has been tampered with by inserting web shells.<\/span><\/span><\/span><\/p>\n<ul>\n<li><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Run a scan in the web root looking for operating system calls<\/span><\/span><\/span><\/li>\n<li><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Look to see if there are any exe files or web app codes in the upload directories, or anywhere else you wouldn\u2019t expect to find them<\/span><\/span><\/span><\/li>\n<li><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Check out the Parsing Web Server Logs looking for GET commands or POST requests in relation to any odd looking web scripts<\/span><\/span><\/span><\/li>\n<li><span style=\"color: #696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Be on the alert for new processes imported via the web server process.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p class=\"entry-title\"><span style=\"font-size: 18px;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Continue to the rest of the article <a href=\"\/blog\/3-signs-that-your-web-servers-security-has-been-compromised-part-2\"><span style=\"color: #0000ff;\">\u201c3 Signs that your Web Server\u2019s Security has been Compromised \u2013 Part 2\u201d &gt;&gt;&gt;<\/span><\/a><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than ever, businesses have to be careful of attacks on servers and business networks to ensure that their data, and that of their customers\u2019, are fully protected. This is especially true of sensitive data such as credit card and personal details, especially as a failure to protect this could incur a hefty fine when [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1017,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,9,8],"tags":[],"class_list":["post-1015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1015"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1015\/revisions"}],"predecessor-version":[{"id":4233,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1015\/revisions\/4233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1017"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}