Hi,
Two doors where the shell hack can take over the server.
First, the ftp credentials of the server users where maliciously stolen from the PC. For example, sitemanager.xml of filezilla is an easy target because it is just a text file that can be grab and send to the trojan executioner.
Second, entry by force and slow cooking. This method is used along with the cURL remote form spoofing. What happened here is that they create an alpha numeric array base e.g. A, a, B, b, C, c, 1,2,3,4,and the list goes on., they go to the target site and attempt a fake registration just to find out how many characters, what type of characters are allowed for a password, they look around to the site and look for any valid registered users e.g. admin. Once they find all these info., they feed the cURL with the random alphanumeric combination using your own password control. They continue to do this process in loop for X^n where x is the sum of alpha numeric in the array and n = x/no. of minimum and maximum password characters required.
something like this, but I am not going to make the code even near to a working codes..
$pass_array = array(## all possible allowed alha-numeric ##);
$pass_cCount = 12; ## minimum
$generate_fake_password = randomized_array($pass_array,$pass_cCount);
$gnenrate_md5_pass = md5($generate_fake_password);
The expected output of the above script is feed to the cURL as password e.g.
$y = 0;
while($y<= 10000000000){
## do this …