You are missing our premiere tool bar navigation system! Register and use it for FREE!

NukeCops  
•  Home •  Downloads •  Gallery •  Your Account •  Forums • 
Readme First
- Readme First! -

Read and follow the rules, otherwise your posts will be closed
Modules
· Home
· FAQ
· Buy a Theme
· Advertising
· AvantGo
· Bookmarks
· Columbia
· Community
· Donations
· Downloads
· Feedback
· Forums
· PHP-Nuke HOWTO
· Private Messages
· Search
· Statistics
· Stories Archive
· Submit News
· Surveys
· Theme Gallery
· Top
· Topics
· Your Account
Who's Online
There are currently, 683 guest(s) and 0 member(s) that are online.

You are Anonymous user. You can register for free by clicking here
Security: Update - Hacking from Lacnic
PHP-NukeTimothy writes "It seems a wide variety of hits from Lacnic sites in the 200 and 201 IP range are union attempts, or calls on admin.php

Lacnic will issue a trouble ticket number, but they never reply and never close the trouble ticket. LACNIC is member of the NRO (Number Resource Organization)

The ineffectiveness of Lacnic to stop Brazilian hackers and others, and their abuse of their own trouble ticket system demands attention.


Recently we've seen attempts to access admin.php while spoofing Google's IP addresses. To automatically ban the IP's means a webmaster's site would no longer be spidered by Google. Google Adsense revenue and other income would drop off.

Also at issue is one website with a .ws extension. We contacted administrators for .ws, and got the same lack of interest as we did from Lacnic. Again, PhpNuke webmasters are still vulnerable due to lack of action on the part of the providers.

From a legal standpoint, the US Supreme Court ruled that the registrars are not responsible for the registrant. So Network Solutions could take your money, but are not responsible for anything the registrant does. It falls back on the hosting company to take action.

Yahoo, for one does not include hacking as an area for complaints. (see http://abuse.yahoo.com/ ) where most providers that offer free sites (the cause of many problems) include hacking on their abuse reporting page.

At NukeFind ( www.NukeFind.com ) we recommend deleting admin.php and auth.php from the web directory all together. When we need to perform admin functions, we FTP the files back to the server and take care of business. When finished we delete them.

For more, and to see addresses to hacker websites to watch out for, our IP address ban list, helpful contact information, etc, download our zip compressed text file from:
our livephone.us website here

(We will not publish this information where it can be spidered or accessed directly.)

LivePhone.us specializes in voice over the Internet. Our NukeFind website is the world's largest database of Nuke Powered websites.




"
Posted on Saturday, May 29 @ 17:21:22 CEST by Zhen-Xjell
 
Related Links
· More about PHP-Nuke
· News by Zhen-Xjell


Most read story about PHP-Nuke:
PHP-Nuke new development direction (part 2)

Article Rating
Average Score: 5
Votes: 2


Please take a second and vote for this article:

Excellent
Very Good
Good
Regular
Bad


Options

 Printer Friendly Page  Printer Friendly Page

 Send to a Friend  Send to a Friend

Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register

Re: Update - Hacking from Lacnic (Score: 1)
by Zhen-Xjell on Saturday, May 29 @ 17:22:57 CEST
(User Info | Send a Message) http://castlecops.com
Are you sure it isn't from Google Proxy that is used by the translater? The Google crawler comes in from completely different CIDR address.



Re: Update - Hacking from Lacnic (Score: 1)
by allevon on Saturday, May 29 @ 18:42:49 CEST
(User Info | Send a Message) http://www.AlleVonTech.com
Good Article!! Well said.



Re: Update - Hacking from Lacnic (Score: 1)
by Imagination on Sunday, May 30 @ 14:04:44 CEST
(User Info | Send a Message)
ive also had these attempts on my site but the weird thing being they only attack the one site that leads me to beleave ti is aimed where as the other sites i have are sage from this strange but true



Re: Update - Hacking from Lacnic (Score: 1)
by Xeon on Monday, May 31 @ 00:31:43 CEST
(User Info | Send a Message) http://www.credit-repair-combat.com/
Yes, these and the RIPE and APNIC IP's are fully banned from my sites for this same reason.

The Class A ban numbers are owned by these ISP's and since my site is a USA only site, they get the full Class A ban. Others aren't so fortunate since they want to allow IP's from those areas of the world and it makes life very difficult.

Here are the ones I recommend banning if you are only interested in traffic from US IP's.

They are:

80.*
81.*
82.*
83.*

202.*
203.*
210.*
211.*
212.*
213.*
217.*
218.*
219.*
220.*
221.*
222.*

Those are the primaries, there are a few scattered others, but their easy to spot if you're really paying attention to the traffic on your sites.

See ya,
213.*
217.*


Powered by TOGETHER TEAM srl ITALY http://www.togetherteam.it - DONDELEO E-COMMERCE http://www.DonDeLeo.com - TUTTISU E-COMMERCE http://www.tuttisu.it
Web site engine's code is Copyright © 2002 by PHP-Nuke. All Rights Reserved. PHP-Nuke is Free Software released under the GNU/GPL license.
Page Generation: 0.148 Seconds - 228 pages served in past 5 minutes. Nuke Cops Founded by Paul Laudanski (Zhen-Xjell)
:: FI Theme :: PHP-Nuke theme by coldblooded (www.nukemods.com) ::