Closed

remove malicious code from server...

i have a server with many infections. i need someone to remove them..

for example,see list below. i can send you a zip file of infect files...

/data/home/atoc/dcn/wiki/mediawiki-1.5.5/images/thumb/9/9d/[url removed, login to view]: [url removed, login to view] FOUND

> > /data/home/atoc/dcn/old_wiki/ACM/wiki/images/thumb/0/03/[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc/aerosol/images/a/aa/.[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc/wiki/config/[url removed, login to view]: PHP.Shell-38 FOUND

> > /data/apache/htdocs/atoc/tmp/[url removed, login to view]: [url removed, login to view] FOUND

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]: [url removed, login to view] FOUND

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]: [url removed, login to view] FOUND

> > /data/apache/htdocs/atoc-old/aerosol/images/8/8c/store/software1/images/[url removed, login to view]: PHP.Shell-38 FOUND

> > /data/apache/htdocs/atoc-old/aerosol/images/a/aa/.[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc-old/wiki/config/[url removed, login to view]: PHP.Shell-38 FOUND

> > /data/apache/htdocs/atoc-old/atoc/aerosol/images/a/aa/.[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc-old/phpMyAdmin-2.10.2-english/config/[url removed, login to view]: PHP.R57-1 FOUND

> > /data/apache/htdocs/atoc-old/phpMyAdmin-2.10.2-english/config/[url removed, login to view]: PHP.C99-9 FOUND

> > /data/apache/htdocs/atoc-old/phpMyAdmin-2.10.2-english/config/[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc-old/phpMyAdmin-2.10.2-english/config/[url removed, login to view]: PHP.Shell-18 FOUND

> > /data/apache/htdocs/atoc-old/phpMyAdmin-2.10.2-english/lang/[url removed, login to view]: [url removed, login to view] FOUND

> > /data/apache/htdocs/atoc-old/webdav/next/[url removed, login to view]: PHP.Shell-38 FOUND

> > /tmp/[url removed, login to view]: [url removed, login to view] FOUND

> >

> > % find /data/apache/htdocs/atoc/images -user nobody -name \*.php

> > /data/apache/htdocs/atoc/images/headers/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/applications/.6/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/roster/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/headers - backup and psds/old headers 125x600/header4 - [url removed, login to view]

> > /data/apache/htdocs/atoc/images/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/stories/[url removed, login to view]

> > /data/apache/htdocs/atoc/images/banners/.[url removed, login to view]

> > /data/apache/htdocs/atoc/images/banners/.[url removed, login to view]

> >

> >

> > ----------

> > Status(edit): by jake Fri Jan 4 08:59:10 2013

> > ----------

> > Initially defanged by running:

> >

> > sudo chown root:root /data/apache/htdocs/atoc-old

> > sudo chmod 0 /data/apache/htdocs/atoc-old

> > sudo chmod 0 /data/apache/htdocs/atoc/tmp

> > find /data/apache/htdocs/atoc/images -user nobody -name \*.php -exec sudo chown root:root {} \;

> > find /data/apache/htdocs/atoc/images -user nobody -name \*.php -exec sudo chmod 0 {} \;

> > sudo chmod 0 /data/apache/htdocs/atoc/images/[url removed, login to view]

> > sudo chown root:root /data/apache/htdocs/atoc/images/[url removed, login to view]

> > sudo chown root:root /data/apache/htdocs/atoc/wiki/config/[url removed, login to view]

> > sudo chmod 0 /data/apache/htdocs/atoc/wiki/config/[url removed, login to view]

> > sudo chown root:root /data/apache/htdocs/atoc/aerosol/images/a/aa/.[url removed, login to view]

> > sudo chmod 0 /data/apache/htdocs/atoc/aerosol/images/a/aa/.[url removed, login to view]

this is a list of some examples

Skills: Apache, Engineering, PHP, Software Architecture, Technical Support

See more: roster examples, roster example, root info, example of a roster, edit from home, c code examples, c99 php, c++ code examples, webdav, web1, test sql server, malicious, jake, edit stories, status code, php file remove, remove banners, apache php config, found server, code wiki, chown, config apache php, chown user, code status, apache config php

About the Employer:
( 133 reviews ) London, United States

Project ID: #4260652

19 freelancers are bidding on average $88 for this job

jfreyre

I can clean up the whole server.

$180 USD in 1 day
(165 Reviews)
6.9
tuxadmin

Hi, please see my profile for security related issues. Thank you.

$99 USD in 1 day
(87 Reviews)
6.3
hvtuananh

You should send me access to your server instead. All malware will be removed within 24 hours.

$100 USD in 1 day
(125 Reviews)
6.0
tech717

Hi, Let's Start Now !!

$89 USD in 0 days
(176 Reviews)
5.9
bradhaas

I can fix this for you quickly. Please see my private message.

$99 USD in 1 day
(38 Reviews)
5.5
Nick1

Certified Linux System Administrator and Security Advisor ready to work. I can start right away. Kindly check my PM. Regards. Nick.

$180 USD in 0 days
(69 Reviews)
5.5
opengeek

Ready to remove malicious code from server. I have experince of it. check private message for details. Thanks OpenGeek

$60 USD in 2 days
(63 Reviews)
5.4
spriditis

Web developer. previous experience with cleaning websites from malware and restoring data after hacking. See PM for questions..

$80 USD in 2 days
(74 Reviews)
5.2
codetrance

I can help you. Thank you.

$75 USD in 2 days
(42 Reviews)
5.1
pivn

let expert do this

$80 USD in 0 days
(40 Reviews)
4.7
metaexcel

Hello Sir, Please check my profile regarding malwares issues. Please check PMB for more details. Thanks

$150 USD in 3 days
(40 Reviews)
4.7
yorkstart

Hello, I can finish this help you today. Please select my bid then we will start. Thank you

$99 USD in 2 days
(27 Reviews)
4.4
kirilpanchev

Dear sir, I have over 10 years of experience in Web Development including PHP, MySQL, Apache, etc. I am a Zend Certified PHP Developer (ZCE). I can help you out with your troubles. Cheers!

$40 USD in 1 day
(27 Reviews)
4.4
chsztsl

Please check the PMB.

$150 USD in 1 day
(29 Reviews)
4.2
Towhidd

This can be done easily. Please check my feedback and portfolio about virus remove project. Thanks

$50 USD in 1 day
(28 Reviews)
4.3
technofreakz

I can clean up malicious codes.

$40 USD in 1 day
(16 Reviews)
3.9
Mercurie6

My name is Ken. I would like to help you remove you malicious php. My bid is genuine. I am the sys admin for a program called Cybergei. This is a remote computer support software that enables my company to provide comp More

$30 USD in 1 day
(0 Reviews)
0.0
muhammadashraf75

Hi I can remove them , let give it to me . You will get ride of this issue.

$100 USD in 1 day
(1 Review)
0.0
instr

I can remove the malicious files from server fast an quite. There may be more things such as malicious codes, that I can check.

$50 USD in 1 day
(0 Reviews)
0.0
suekline001

Hi, First of all, I need to have a thorough look at all the errors. If it is not fixable, you may have to build it from scratch once again.We are experienced in web development, with great expertise in all the technol More

$100 USD in 3 days
(0 Reviews)
0.0