NYCPHP Meetup

NYPHP.org

[nycphp-talk] I've been hit with an eval(base64_decode("....")) injection attack

Rob Marscher rmarscher at beaffinitive.com
Fri Feb 24 16:11:03 EST 2012


On Feb 24, 2012, at 4:08 PM, Rob Marscher wrote:
> On Feb 24, 2012, at 4:04 PM, David Mintz wrote:
> ...snip...
>> ob_start('mrobh')
> ...snip...
> 
> I did a little googling and found this pretty relevant article:
> http://danhilltech.tumblr.com/post/18085864093/if-you-get-eval-base64-hacked-on-wordpress-dreamhost
> 

And another cleanup suggestion:
http://blog.sucuri.net/2010/05/simple-cleanup-solution-for-the-latest-wordpress-hack.html
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120224/36a69736/attachment.html>


More information about the talk mailing list