Quantcast
Channel: BulletProof Security Forum » All Posts
Viewing all articles
Browse latest Browse all 12477

Reply To: Cannot load bulletproof-security/admin/tools/tools.php

$
0
0

The BPS Pro Pro-Tools tools.php file contains a Base64 Decoder/Encoder, which uses/contains standard PHP functions for Base64 encoding and decoding.  These standard php functions are also commonly used by hackers in hacking scripts so scanners may see this good/safe/legitimate code as bad/malicious code.  Check with your host and see if they can whitelist the tools.php file.  If they cannot whitelist it then you will not be able to use any of the BPS Pro Pro-Tools tools.

http://forum.ait-pro.com/forums/topic/possible-infected-files-scanner-false-alarms/
http://forum.ait-pro.com/forums/topic/host-asks-to-check-these-files/
http://forum.ait-pro.com/forums/topic/my-website-was-hacked/

Maldetect has 4 whitelisting options:

https://github.com/waja/maldetect

.: 8 [ IGNORE OPTIONS ]

There are four ignore files available and they break down as follows:

/usr/local/maldetect/ignore_paths
A line spaced file for paths that are to be execluded from search results
Sample ignore entry:
/home/user/public_html/cgi-bin

/usr/local/maldetect/ignore_file_ext
A line spaced file for file extensions to be excluded from search results
Sample ignore entry:
.js
.css

/usr/local/maldetect/ignore_sigs
A line spaced file for signatures that should be removed from file scanning
Sample ignore entry:
base64.inject.unclassed

/usr/local/maldetect/ignore_inotify
A line spaced file for regexp paths that are excluded from inotify monitoring
Sample ignore entry:
^/home/user$
^/var/tmp/#sql_.*\.MYD$

Viewing all articles
Browse latest Browse all 12477

Trending Articles