我的服務器遭到黑客攻擊,因為我有VBET。
這是線索,證實了這一點:
我無法卸載 VBET!根27888 1 0 18:26? SS 0:00 / usr / sbin目錄 /進出口 - MC 1OSBjj - 0007Cf - 4S SERVER_SIGNATURE = <ADDRESS> Apache/2.2.14(Uni x)編程 mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 WWW服務器在**** COM端口80 </地址>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2(紅帽修改)SERVER_PORT = 80 HTTP_HOST = WWW **** COM DOCUMENT_ROOT = / home/w11s0s3r/public_html SCRIPT_FILENAME = / home/w11s0s3r/public_html/vbenterprisetranslator_seo.php REQUEST_URI = /存檔/ index.php/f-23.html SCRIPT_NAME = / vbenterprisetranslator_seo.php HTTP_CONNECTION =保持活動 REMOTE_PORT = 41741 PATH = / bin中:/ usr / bin中PWD = / home/w11s0s3r/public_html SERVER_ADMIN =站長 **** COM REDIRECT_UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ REDIRECT_STATUS = 200 HTTP_ACCEPT =* / * REMOTE_ADDR = 72.55.191.104 SHLVL = 1 SERVER_NAME = WWW *** COM HTTP_PRAGMA =無緩存 SERVER_SOFTWARE = Apache/2.2.14(Uni x)編程 mod_ssl/2.2.14 OpenSSL/0.9.8e - FIPS - RHEL5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 QUERY_STRING = SERVER_ADDR = 188.165.193.93 GATEWAY_INTERFACE = CGI/1.1 SERVER_PROTOCOL = HTTP/1.0 REDIRECT_URL = / archive/index.php/f-23.html REQUEST_METHOD =頭 _ = / usr / sbin目錄 / sendmail的
w11s0s3r 27996 27888 1 18:26? ð 0:00 / usr / sbin目錄 /進出口 - MC 1OSBjj - 0007Cf - 4S SERVER_SIGNATURE = <ADDRESS> Apache/2.2.14(Uni x)編程 mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635服務器在WWW *** COM端口80 </地址>? UNIQUE_ID = TCTYtbylwV0AAEFiMjYAAABQ HTTP_USER_AGENT = Wget/1.10.2(紅帽修改)SERVER_PORT = 80 HTTP_HOST = WWW **** COM DOCUMENT_ROOT = / home/w11s0s3r/public_html SCRIPT_FILENAME = / home/w11s0s3r/public_html/vbenterprisetranslato ^ C
請幫我我的服務器發送大量的垃圾郵件!
正在破解!
幫助米哈爾 Podbielski!