HOW TO STOP HACKERS FROM HACKING YOUR BULKSMS WEBSITE

HOW TO STOP HACKERS FROM YOUR BULKSMS WEBSITE

HOW TO STOP HACKERS FROM HACKING YOUR BULK SMS WEBSITE

 at www.smswholesellers.com we can recover any hacked sms joomla website without any lose to content just call us on 08140970926

1. login into your cpanel and locate a file in your file manager titled classic.html and official.html delete it. Reason being that this is the ftp access of the hacker into your website.
 
2. To resete your joomla password from the cpanel, locate the phpmyadmin from the cpanel
Go into the phpmyadmin and check below
the database for jos_users click to open after which
you locate the first user which should be the super administrator and
click edit. put a new username and a new password. Before you click
save or go select MD5 on the dropdown by the side of the password you
can now save.
 
3. To reset the username and password for affected members, login into yourwebsite.com/administrator and locate site, underneed it locate user manager, find affected users and edit their username and password

4. Change the default database prefix (jos_)

Most SQL injections that are written to hack a Joomla! website, try to retrieve data from the jos_userstable. This way, they can retrieve the username and password from the super administrator of the website. Changing the default prefix into something random, will prevent (most / all) SQL injections.

You can set the database prefix when installing your Joomla! website. If you've already installed Joomla! and want to change your prefix, do the following:

 

  • Log on to your Joomla! back-end.
  • Go to your global configuration and search for the database
  • Change your database prefix (Example: fdasqw_) and press Save.
  • Go to phpMyAdmin to access your database.
  • Go to export, leave all default values and press Start. Exporting the database can take a while.
  • When done, select all code and copy it to notepad (or any other text editor)
  • In phpMyAdmin, select all tables and delete them
  • In notepad, do a Search & replace (Ctrl + H). Set the searchterm to jos_ and change it into your new prefix (Example: fdasqw_). Press "Replace all".
  • Select everything in your notepad file and copy it. In phpMyAdmin, go to SQL, paste the queries and pressStart.

 

5. Change your .htaccess file

Add the following lines to your .htaccess file to block out some common exploits.

########## End - Advanced server protection
RewriteRule ^(.*)$ - [F,L]RewriteCond %{QUERY_STRING} union.*all.*select.* [NC]RewriteCond %{QUERY_STRING} union.*select.*\( [NC,OR]RewriteCond %{QUERY_STRING} concat.*\( [NC,OR]
## May cause problems on legitimate requests## SQLi first line of defense
RewriteRule ^(htaccess\.txt|configuration\.php-dist)$ - [F,L]## Disallow access to htaccess.txt and configuration.php-dist
RewriteRule ^(components|modules|plugins|templates)/.*$ - [F,L]RewriteRule ^(templates/.*\.php)$ $1 [L]RewriteRule ^((components|modules|plugins|templates)/.*index\.php(.*))$ $1 [L]RewriteRule ^((components|modules|plugins|templates)/.*\.(jp[g,2,eg]?|png|gif|bmp|css|js|swf|ico|htm[l]?))$ $1 [L]## Allow limited access for certain Joomla! system directories with client-accessible content
RewriteRule ^(cache|includes|language|libraries|logs|tmp)/.*$ - [F,L]RewriteRule ^(includes/js/.*)$ $1 [L]## Disallow front-end access for certain Joomla! system directories
RewriteRule ^xmlrpc/(.*)$ - [F,L]RewriteRule ^(xmlrpc/index\.php)$ $1 [L]## Explicitly allow access only to XML-RPC's xmlrpc/index.php or plain xmlrpc/ directory
RewriteRule ^administrator/(.*)$ - [F,L]RewriteRule ^(administrator/(components|modules|templates|images|plugins)/.*\.(jpe[g,2]?|jpg|png|gif|bmp|css|js|swf|htm[l]?))$ $1 [L]RewriteRule ^(administrator/index[2,3].php)$ $1 [L]RewriteRule ^(administrator/index.php)$ $1 [L]RewriteRule ^(administrator/index.htm[l]?)$ $1 [L]RewriteRule ^(administrator[/]?)$ administrator/index.php [L]## This also blocks fingerprinting attacks browsing for XML and INI files## Back-end protection
RewriteRule ^(.*)$ - [F,L]RewriteCond %{QUERY_STRING} =PHP[a-z0-9]{8}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{12} [NC]## http://osvdb.org/12184 for more information## your PHP version). See http://www.0php.com/php_easter_egg.php and## Disallow PHP Easter Eggs (can be used in fingerprinting attacks to determine
RewriteRule ^(.*)$ - [F,L]RewriteCond %{QUERY_STRING} (^|&)tmpl= [NC]RewriteCond %{QUERY_STRING} (^|&)template= [NC,OR]RewriteCond %{QUERY_STRING} (^|&)tp= [NC,OR]RewriteRule ^(.*)$ $1 [L]RewriteCond %{QUERY_STRING} (^|&)tmpl=component [NC]
## Disallow visual fingerprinting of Joomla! sites (module position dump)
RewriteRule \.(jpe[g,2]?|jpg|png|gif|bmp|css|js|swf|ico|htm[l]?)$ - [F,L]RewriteCond %{HTTP_REFERER} !^http://www\.xxx\.com [NC]RewriteCond %{REQUEST_FILENAME} -fRewriteRule ^(images/stories/*\.(jpe[g,2]?|jpg|png|gif|bmp|css|js|swf|ico|htm[l]?))$ $1 [L]
########## End - Advanced server protection rules exceptions ####

6. I had a serious problem with someone hacking into my .htaccess file and my only solution was to make the file unhackable. First, I cleaned up the .htaccess file and any PHP files of all hacks. Then I changed the file permissions to 444 (644 still allows access) on the .htaccess file. 

 

THANKS. WE ARE DOING MORE RESEARCH TO STOP THIS HACKERS PERMANENTLY. MERRY CHRISTMAS. BUY VERY STABLE SMS UNITS FROM US AT A CHEAP PRICE. MERRY CHRISTMAS

 

SEO

Search Engine Promotion Widget

 

 

MyLiveChat