Beefy Boxes and Bandwidth Generously Provided by pair Networks
Pathologically Eclectic Rubbish Lister
 
PerlMonks  

Re: Hacking of JavaScript files in our corporate website

by flexvault (Monsignor)
on Dec 16, 2012 at 14:53 UTC ( [id://1009072]=note: print w/replies, xml ) Need Help??


in reply to Hacking of JavaScript files in our corporate website

shajiindia,

IMHO, you should be doing something to fix the problem;

    Why are you letting someone modify your live web-site?

Check the logs, close the exposure holes, etc. Then fix the code and don't let it happen again.

I've been hacked, and it isn't fun, but I fixed the source of the problem.

First, all of your JavaScript files should be read-only. Look at everything, since there may be other compromised files.

To answer your question, a very simple Perl script run every hour could check the modified JS to a checksum and if it fails to verify, then notify the sysadmin. But if the site is that un-secure, then maybe *they* could modify your Perl script!

Good Luck...Ed

"Well done is better than well said." - Benjamin Franklin

  • Comment on Re: Hacking of JavaScript files in our corporate website

Replies are listed 'Best First'.
Re^2: Hacking of JavaScript files in our corporate website
by shajiindia (Acolyte) on Dec 17, 2012 at 09:11 UTC
    Thanks for your help.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://1009072]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others rifling through the Monastery: (6)
As of 2024-04-23 23:18 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found