A while back, I explained how hackers created hidden admin users after hacking a WordPress blog. In this post, we will see how they upload and hide rogue plugins.
Did you know the EICAR AV Test file was a program? In this post, we disassemble that 68-byte COM program and analyze its code.
Very often, when we clean up a hacked WordPress website, we found hidden admin users created by the attackers. In this post, we will see how hackers manage to create and hide them.
While cleaning-up a hacked WordPress site, we found that some malicious code was added to the theme by its developers.
NinjaScanner should work out-of-the-box in most cases, but some hosting restrictions, e.g., server resource limits or security policies, may prevent it from working as expected. We will see in this article the most common issues a user may experience.