You detect abnormal activity on your server, a modification of your files, system slowdown ... After verification, you are sure, you are attacked.
Here are some rules you have to recover quickly apply your site, reduce losses of data and the risks of your site hacked again.
The first rule: be quick!
An attack is often a matter of seconds or minutes. The goal of the hacker is to get his way as quickly as possible.
Try to get the IP address of the hacker
Make a "tracert" to find the most accurate location possible hacker.
Tracert (under Windows) or traceroute (Linux) is a network diagnostic tool found on most operating systems, to determine the path a packet.
On UNIX / Linux systems, the traceroute command is:
traceroute name.of.the.machine
On Windows systems, the traceroute command is:
tracert name.of.the.machine
Put your site offline
Consider putting your site offline immediately to prevent infecting your visitors and identify the origin of hacking
Change all your passwords.
Change the password for your FTP access for a stronger password. You also need to scan and clean your PC ugly antivirus to prevent your site is attacked again.
Reinstall a clean copy of your site
After hacking your website, the hacker must surely install a backdoor into your server. That is why it is mandatory to delete any files on FTP and reinstall a clean copy of your site.
How to reduce the chances that your site hacked?
Stay up to date with the latest updates
If you install an application for your site, using the latest existing version. This includes applications from third and CMS (Content Management System) like Joomla or WordPress. Verify the information provide playing away and taking in terms of safety.
Check your site for common vulnerabilities.
Avoid having directories with open permissions. Also check out the XSS vulnerability (cross-site scripting), Upload, RFI, and SQL injection.
Keep an eye on your log files
The log is the log of a server. It lists all the queries delivered by the server to clients. You might be surprised by what you find.
Use secure protocols
SSH and SFTP must be used for data transfer, rather than plain text protocols such as Telnet or FTP. SSH and SFTP use encryption and are much safer.
Remember that the best support for this blog is to like and share our articles!
Here are some rules you have to recover quickly apply your site, reduce losses of data and the risks of your site hacked again.
The first rule: be quick!
An attack is often a matter of seconds or minutes. The goal of the hacker is to get his way as quickly as possible.
Try to get the IP address of the hacker
Make a "tracert" to find the most accurate location possible hacker.
Tracert (under Windows) or traceroute (Linux) is a network diagnostic tool found on most operating systems, to determine the path a packet.
On UNIX / Linux systems, the traceroute command is:
traceroute name.of.the.machine
On Windows systems, the traceroute command is:
tracert name.of.the.machine
Put your site offline
Consider putting your site offline immediately to prevent infecting your visitors and identify the origin of hacking
Change all your passwords.
Change the password for your FTP access for a stronger password. You also need to scan and clean your PC ugly antivirus to prevent your site is attacked again.
Reinstall a clean copy of your site
After hacking your website, the hacker must surely install a backdoor into your server. That is why it is mandatory to delete any files on FTP and reinstall a clean copy of your site.
How to reduce the chances that your site hacked?
Stay up to date with the latest updates
If you install an application for your site, using the latest existing version. This includes applications from third and CMS (Content Management System) like Joomla or WordPress. Verify the information provide playing away and taking in terms of safety.
Check your site for common vulnerabilities.
Avoid having directories with open permissions. Also check out the XSS vulnerability (cross-site scripting), Upload, RFI, and SQL injection.
Keep an eye on your log files
The log is the log of a server. It lists all the queries delivered by the server to clients. You might be surprised by what you find.
Use secure protocols
SSH and SFTP must be used for data transfer, rather than plain text protocols such as Telnet or FTP. SSH and SFTP use encryption and are much safer.
Remember that the best support for this blog is to like and share our articles!
ConversionConversion EmoticonEmoticon