Decoding PHP exploits and banning brute-force attackers
This post will discuss forensics on a Linux system and use basic forensics techniques to investigate two attacks made against a Linux web server. Specifically, this post is going to focus on reading and understanding information contained in log files. The first attack is an attempt by an adversary to gain un-authorised administrative access on a WordPress website by attacking the wp-login.php page. The second attack is an obfuscated PHP script that, when decoded, attempts to find and exploit several PHP files commonly used by Joomla websites. Before looking at either attack it is necessary to establish some prerequisite knowledge regarding Linux and how system events are logged. the '/var/log' directory on a Kali Linux system Linux systems log all events in text files known simply as log files. There is no sh...