[Cialug] an easier way?
chris at bynw.com
chris at bynw.com
Wed Apr 22 14:34:02 UTC 2020
I do. I have a copy of the sql dump locally that I can manipulate. But i
have no idea what the script would be to get rid of the bad script. I
cant just get rid of all <script> tags because wordpress uses javascript
in formatting.
On 2020-04-22 09:27, Scott Yates wrote:
> If you have direct access to the database, you may be able to whip up a
> SQL
> script.
>
> On Wed, Apr 22, 2020 at 9:23 AM <chris at bynw.com> wrote:
>
>> wordfence isnt available that i saw anyway. i can double check to see.
>> but all the php files were nuked and re-uploaded from fresh copies.
>> it's
>> in the sql file of the database dump. the redirect script that is on
>> every post. over 700 instances of it. thus the need for an easier way
>> of
>> removing it. manually editing 700 posts is time consuming.
>>
>>
>>
>> On 2020-04-22 09:14, L. V. Lammert wrote:
>> > On Wed, 22 Apr 2020, chris wrote:
>> >
>> >> wiped out all the plugins to be safe. but the redirect script was and
>> >> still is on every post.
>> >>
>> > 2nd possibility is in the theme itself, .. update/reinstall.
>> >
>> > You can also grep all files for base64 encoding, .. that's a popular
>> > way
>> > to obfuscate malicious code.
>> >
>> > Or, does your hosting provider have WordFence available?
>> >
>> > Lee
>> > _______________________________________________
>> > Cialug mailing list
>> > Cialug at cialug.org
>> > https://www.cialug.org/cgi-bin/mailman/listinfo/cialug
>> _______________________________________________
>> Cialug mailing list
>> Cialug at cialug.org
>> https://www.cialug.org/cgi-bin/mailman/listinfo/cialug
>>
> _______________________________________________
> Cialug mailing list
> Cialug at cialug.org
> https://www.cialug.org/cgi-bin/mailman/listinfo/cialug
More information about the Cialug
mailing list