Why are hackers interested in your website?

Did you know, that people are trying to break into your WordPress website basically all the time? This comes as a shock to some – I’ve seen a few anxious requests for guidance from people who read their logs, and discovered that attacks were going on. WordPress now runs around a quarter of all websites on the Internet. As such, it’s an attractive target for attackers – they can build tools which have a huge number of potential targets. But, why do they want to do this anyway? Motives vary – there are indeed plenty of people who think that destroying things is fun. However, the main motive is a predictable one: profit. There’s money to be made. This at first seems surprising – where’s the money to be made in my little blog, someone asks? After all, I don’t make any money from it myself – how can they? Three main ways… 1. Computing power, “free” and anonymous It’s not your website itself that the average attacker wants – they want the computer power of the webserver that it’s running on. They want the free electricity. This can be used to perform complex computations such as those used to “mine” digital currencies like Bitcoin – or simply to hide the hacker’s identity, whilst he uses a server that is not linked to his name, to perform other tasks. 2. Spam, spam, spam spam… That computing power can also be used to churn out zillions of spam emails – again, for free (to the attacker), and in a way that’s hard to trace, since the emails will come from your server, not the attacker’s own computers. Since emails are quick and easy to send, often [...]

2016-12-23T13:49:33-08:00March 15th, 2015|IT, Wordpress|0 Comments


I have been a huge fan of Skeep. It helps me all the time in my daily routine. Too bad the project got abandoned. Some discussion here. Anyways I needed a place to dump my findings that I could not find online on other resources. So here it goes.  1. Logon script would not run (or so it seems). It would not return any errors if you run the script manually. Thanks to this thread - most probable issue is a null value of one of the properties that just screws up the etire commit changes command. Solution: commit changes after every property change Below is the sample of the skeeplogon.vbs that finally works for all machines regardless of possible errors: on error resume next Dim strUserName, IP, MAC, Serial, boolLoggedOn 'local computer strComputer = "." ' Constants required for name translate Const ADS_NAME_INITTYPE_GC = 3 Const ADS_NAME_TYPE_NT4 = 3 Const ADS_NAME_TYPE_1779 = 1 'Get the NETBIOS name of the domain Set objSystemInfo = CreateObject("ADSystemInfo") strDomain = objSystemInfo.DomainShortName ' Get the name of the computer set objNetwork = createobject("Wscript.Network") strComputer = objNetwork.ComputerName ' Call function to return the distinguished name (DN) of the computer strComputerDN = getComputerDN(strComputer,strDomain) Set objComp=GetObject("LDAP://" & strComputerDN) GETDETAILS objComp.employeeNumber = strUserName 'Last Logged on User objComp.SetInfo objComp.employeeID = boolLoggedOn 'loggedOn objComp.SetInfo objComp.ipHostNumber = IP 'IP Address objComp.SetInfo objComp.networkAddress = MAC 'MAC address objComp.SetInfo objComp.serialNumber = Serial 'Serial objComp.SetInfo function getComputerDN(byval strComputer,byval strDomain) Set objTrans = CreateObject("NameTranslate") ' Initialize name translate using global catalog objTrans.Init ADS_NAME_INITTYPE_GC, "" ' Input computer name (NT Format) objTrans.Set ADS_NAME_TYPE_NT4, strDomain & "\" & strComputer & "$" ' Get Distinguished Name. getComputerDN = objTrans.Get(ADS_NAME_TYPE_1779) end function '*************************GET COMPUTER INFO************************* function GETDETAILS Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" [...]

2016-12-23T13:49:33-08:00February 20th, 2015|IT|0 Comments