Where to look for a security analyst to hunt for bad code ?

Discussion in 'Security' started by Rivmedia, Sep 2, 2009.

  1. #1
    First off is this expensive ? If so ill just start a fresh but id like to avoid that option if possible.

    basically ive just found a shed load of spamming pages in a part of the site that doesnt get used , i have got rid of them and all scripts running ( joomla ) have been updated to the latest versions.

    The site has been slow for a while and yesterday i started to move the site to another host ( thinking it was the hosts fault ) which is when i noticed all the spam files, since then the new host says it looks as if there is signs of a hacking and this is causing the slowness. Now ive reinstalled the template it was running and reinstalled all the joomla files and the site has come back to life , however its still slow so im thinking that maybe there are things still in the site somewhere.

    Where can i find a security analyst that will be able to sort this out so everything is secure and no code is being executed ?

    P.S if you know how to then please let me know how you propose to do it and how much it will cost.

    Thanks
     
    Rivmedia, Sep 2, 2009 IP
  2. awesometbn

    awesometbn Peon

    Messages:
    268
    Likes Received:
    8
    Best Answers:
    0
    Trophy Points:
    0
    #2
    A couple of things come to mind. First you would do well to use a web application security assessment tool like Web Inspect. I think the original software was from SPI Dynamics but was bought by HP, so search the hp.com website for a software product (or free evaluation) called HP WebInspect. There are other kinds of software tools you can use but Web Inspect has a great reputation and will get the job done. I don't know about the pricing but I'm sure it's not freeware or inexpensive because it is marketed to big companies.

    Second, you may want to manually review your Joomla templates and files for any unusual code, especially encrypted footers and jibberish for comments. I found a few things this way and was able to reverse engineer a solution by searching for specific code fragments on Google. You can probably do the same thing yourself, but it will take a long time to carefully read all those lines of code. Do this from the file manager on your web server, not from the web browser window. That way you can catch any server-side processing before it has been rendered for viewing by regular website visitors.

    If you are looking for quotes, compare them to a reputable service like this one,
    hxxp://www.vigilar.com/services/webApplicationAssessment.php

    Let us know what you decide to do and the progress you've made. Thanks!
     
    awesometbn, Sep 7, 2009 IP
  3. jtpratt

    jtpratt Well-Known Member

    Messages:
    170
    Likes Received:
    3
    Best Answers:
    0
    Trophy Points:
    123
    #3
    You can either hire a security analyst (like myself) to ferret out the infected files, and for our Wordpress friends out there, read my Wordpress Security Guide to learn how to do it yourself for free.
     
    jtpratt, Sep 9, 2009 IP