Select
File Manager
Double click to add
Details
File Manager
File Manager
Select
Search by file name
Double click to add
Details
Search by file name
Search by file name
Select
Search by file contents
Double click to add
Details
Search by file contents
Search by file contents
Select
Search by file name and contents
Double click to add
Details
Search by file name and contents
Search by file name and contents
Select
Code Obfuscation
Double click to add
Details
Code Obfuscation
Code Obfuscation
Select
This rule is used to identify code obfuscation attempts.<br />It checks for an incorrect usage of the <b>eval(string)</b> PHP function.
Double click to add
Details
This rule is used to identify code obfuscation attempts.<br />It checks for an incorrect usage of the <b>eval(string)</b> PHP function.
This rule is used to identify code obfuscation attempts.<br />It checks for an incorrect usage of the <b>eval(string)</b> PHP function.
Select
Joomla Safe Heading
Double click to add
Details
Joomla Safe Heading
Joomla Safe Heading
Select
This rule is used to find all the .PHP files that do not start with a valid Joomla Safe Heading.<br />A heading is considered safe when the first line of a file stops the flow if we are reaching that file via URL. For example:<br /><b>defined('_JEXEC') or die;</b><br /><br />All the possible Joomla safe headings are:<br />_JEXEC, JPATH_BASE, JPATH_PLATFORM, _AKEEBA_RESTORATION, FOF_INCLUDED
Double click to add
Details
This rule is used to find all the .PHP files that do not start with a valid Joomla Safe Heading.<br />A heading is considered safe when the first line of a file stops the flow if we are reaching that file via URL. For example:<br /><b>defined('_JEXEC') or die;</b><br /><br />All the possible Joomla safe headings are:<br />_JEXEC, JPATH_BASE, JPATH_PLATFORM, _AKEEBA_RESTORATION, FOF_INCLUDED
This rule is used to find all the .PHP files that do not start with a valid Joomla Safe Heading.<br />A heading is considered safe when the first line of a file stops the flow if we are reaching that file via URL. For example:<br /><b>defined('_JEXEC') or die;</b><br /><br />All the possible Joomla safe headings are:<br />_JEXEC, JPATH_BASE, JPATH_PLATFORM, _AKEEBA_RESTORATION, FOF_INCLUDED
Select
Big Files
Double click to add
Details
Select
This rule is used to search for big files stored in the File System of the server.
Double click to add
Details
This rule is used to search for big files stored in the File System of the server.
This rule is used to search for big files stored in the File System of the server.
Select
Fake Extensions
Double click to add
Details
Fake Extensions
Fake Extensions
Select
This rule is used to search for <b>plugins</b>, <b>templates</b>, <b>components</b> and <b>modules</b> that haven't been installed through the Joomla! Extensions Manager.
Double click to add
Details
This rule is used to search for <b>plugins</b>, <b>templates</b>, <b>components</b> and <b>modules</b> that haven't been installed through the Joomla! Extensions Manager.
This rule is used to search for <b>plugins</b>, <b>templates</b>, <b>components</b> and <b>modules</b> that haven't been installed through the Joomla! Extensions Manager.
Select
Htaccess Hack
Double click to add
Details
Htaccess Hack
Htaccess Hack
Select
This rule is used to search for BAD .htaccess files.<br />A .htaccess file is considered suspicious if it contains one (or more) of these directives: <b>auto_prepend_file</b>, <b>auto_append_file</b>, <b>RewriteRule http</b>.<br /><br />The <b>auto_append_file</b> and <b>auto_prepend_file</b> directives include other PHP files at the beginning or at the end of the Joomle Core. The attackers may use them to include their own code.<br /><br />The <b>RewriteRule http</b> directive may include malicious external redirects.
Double click to add
Details
This rule is used to search for BAD .htaccess files.<br />A .htaccess file is considered suspicious if it contains one (or more) of these directives: <b>auto_prepend_file</b>, <b>auto_append_file</b>, <b>RewriteRule http</b>.<br /><br />The <b>auto_append_file</b> and <b>auto_prepend_file</b> directives include other PHP files at the beginning or at the end of the Joomle Core. The attackers may use them to include their own code.<br /><br />The <b>RewriteRule http</b> directive may include malicious external redirects.
This rule is used to search for BAD .htaccess files.<br />A .htaccess file is considered suspicious if it contains one (or more) of these directives: <b>auto_prepend_file</b>, <b>auto_append_file</b>, <b>RewriteRule http</b>.<br /><br />The <b>auto_append_file</b> and <b>auto_prepend_file</b> directives include other PHP files at the beginning or at the end of the Joomle Core. The attackers may use them to include their own code.<br /><br />The <b>RewriteRule http</b> directive may include malicious external redirects.
Select
All the files seem to have a safe Joomla Heading.
Double click to add
Details
All the files seem to have a safe Joomla Heading.
All the files seem to have a safe Joomla Heading.
Select
No code obfuscation found in files.
Double click to add
Details
No code obfuscation found in files.
No code obfuscation found in files.
Select
No big files have been found.
Double click to add
Details
No big files have been found.
No big files have been found.
Select
Maximum file size found: <strong>%s</strong>
Double click to add
Details
Maximum file size found: <strong>%s</strong>
Maximum file size found: <strong>%s</strong>
Select
All the folders belong to installed extensions.
Double click to add
Details
All the folders belong to installed extensions.
All the folders belong to installed extensions.
Select
This folder does not belong to any installed extension!
Double click to add
Details
This folder does not belong to any installed extension!
This folder does not belong to any installed extension!