no i have changed the default username and password, but i dont know how the hacker was able to get there with firewall and fail2ban open ??RaTTuS wrote: ↑Thu Sep 28, 2017 2:00 pm1) remove port forwarding on your router
2) shut down the RPI
3) download a new version of raspbian and put it on a new SDcard
4) add a new user and disable the user pi
5) create a new version on your RPi server machine
6) recover any files off your old sdcard not exectuables
.
did you leave the rpi open to the internet with user pi / default password?
in the log of fail2ban it show the ip of the hacker that puted the file,so i dont think that it's from the software.Martin Frezman wrote: ↑Thu Sep 28, 2017 2:09 pmIsn't it more likely that there is no problem here at all?
Modern software tends to create all kinds of temporary files, with sometimes somewhat suspicious names, all the time. We've come to accept it. They can't possibly document all the various files and temporary files that they create. You just have to live with it.
Code: Select all
[apache-noscript]
port = http,https
logpath = %(apache_error_log)s
I don't see that in any of the OP's posts (i.e., you are the first to post it).in the log of fail2ban it show the ip of the hacker
i have fail2ban 0.9.2 and i have only changed the section about ssh.DougieLawson wrote: ↑Thu Sep 28, 2017 2:13 pmHave you somehow disabledin fail2ban, because that jail should catch tests for non-existent php scripts and block the remote user?Code: Select all
[apache-noscript] port = http,https logpath = %(apache_error_log)s
Are you running fail2ban 0.9.6-2 or an earlier version?
testproxy.php has been a hack attempt for about four years or more.
https://www.google.co.uk/search?q=testproxy.php
didn't understand what you mean (sorry) can you explain ??Martin Frezman wrote: ↑Thu Sep 28, 2017 2:15 pmI don't see that in any of the OP's posts (i.e., you are the first to post it).in the log of fail2ban it show the ip of the hacker
Have you been in PM with OP (so you know things about the case that are not in the thread) ?
no,not at all.. i created a new username with a new password and deleted the pi user plus i have found that this guy have had the same problem as me : https://www.digitalocean.com/community/ ... le-to-stat
yep it was and i have wordpress (in another folder) with some pluginsShiftPlusOne wrote: ↑Thu Sep 28, 2017 3:22 pmWas it a strong password? I think it's important to figure out what happened here.
@Martin FrezmanMartin Frezman wrote: ↑Thu Sep 28, 2017 2:15 pmI don't see that in any of the OP's posts (i.e., you are the first to post it).in the log of fail2ban it show the ip of the hacker
Have you been in PM with OP (so you know things about the case that are not in the thread) ?