| View previous topic :: View next topic | 
	
	
		| Author | Message | 
	
		| Goatie.dk -
 
 
 Joined: 11 Feb 2005
 Posts: 125
 Location: Denmark > Herning
 
 | 
			
				|  Posted: Wed Mar 29, 2006 9:47 pm    Post subject: w00tw00t |   |  
				| 
 |  
				| I've just been looking through my access.log and found a lot of hacking-attempts. Here's list a little bit of the latest ones.
 
  	  | Quote: |  	  | 24.128.64.211 - - [23/Mar/2006:03:09:28 +0100] "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 500 246 "" "" 82.208.142.95 - - [23/Mar/2006:15:37:30 +0100] "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 500 246 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:46 +0100] "GET /x0x0x0x0x0x0x0x0x0/ThisFileMustNotExist HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:47 +0100] "GET /xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:48 +0100] "GET /xmlrpc/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:49 +0100] "GET /xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:49 +0100] "GET /blog/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:50 +0100] "GET /drupal/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:51 +0100] "GET /community/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:52 +0100] "GET /blogs/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:53 +0100] "GET /blogs/xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:54 +0100] "GET /blog/xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:54 +0100] "GET /blogtest/xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:55 +0100] "GET /b2/xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:56 +0100] "GET /b2evo/xmlsrv/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:57 +0100] "GET /wordpress/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:58 +0100] "GET /phpgroupware/xmlrpc.php HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:59 +0100] "GET /cgi-bin/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:56:59 +0100] "GET /cgi/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:00 +0100] "GET /scgi-bin/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:01 +0100] "GET /awstats/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:02 +0100] "GET /cgi-bin/awstats/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:03 +0100] "GET /scgi-bin/awstats/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:04 +0100] "GET /cgi/awstats/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:04 +0100] "GET /scgi/awstats/awstats.pl HTTP/1.0" 404 234 "" ""
 210.120.62.92 - - [24/Mar/2006:08:57:05 +0100] "GET /scripts/awstats.pl HTTP/1.0" 404 234 "" ""
 64.62.253.140 - - [28/Mar/2006:04:06:08 +0200] "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 500 246 "" ""
 | 
 
 But there's something new I've never seen before which makes an 500 error...
 
  	  | Code: |  	  | 64.62.253.140 - - [28/Mar/2006:04:06:08 +0200] "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 500 246 "" "" | 
 Afte googling a little around I found out it's some kind of a "hacker tool" called DFind. But I don't have the slightest idea what it actualle does.
 
 Does anyone have any knowledge about this program and what it does?
 _________________
 The insane dane who loves AWS :D
 http://home.goatie.dk
  <- pic = online.. no pic, guess ;P |  | 
	
		| Back to top |     | 
	
		|  | 
	
		| Anonymoose -
 
 
 Joined: 09 Sep 2003
 Posts: 2192
 
 
 | 
			
				|  Posted: Thu Mar 30, 2006 12:46 am    Post subject: |   |  
				| 
 |  
				| Just a bunch of preset vulnerability scans in one package... 
 
  	  | Quote: |  	  | 1. Scans for the following vulnerabilities and services:
 
 o Open TCP and UDP ports.
 o HP Web JetAdmin
 o PSOProxy Server
 o HP Web Server
 o Microsoft Frontpage
 o Hacktool.Radmin
 o RealServer
 o Apache Servers
 o IIS servers
 o Windows Media Service
 o IPC$ shares without password protection.
 o Weak write permissions in Microsoft IIS web server.
 o Backdoor.OptixPro.10 and variants.
 o Dictionary attacks on SQL Servers
 o NULL/NTAuth/Passworded connections on Hacktool.Radmin
 o The CCBill webserver module
 o The PHPbb webserver module
 o The PHP-Nuke webserver module.
 o WebDav enabled on IIS5.0 webservers
 o The Microsoft Windows IIS Index Server ISAPI System-level Remote Access Buffer Overflow
 (Microsoft MS01-033)
 o The Microsoft SQL Server MDAC buffer overflow (Microsoft MS02-040).
 
 | 
 
 The actual site for it is here :
 
 http://www.class101.org/
 
 The w00tw00t part in the GET request is just electronic graffiti in your web logs :)
 _________________
 
 "Invent an idiot proof webserver and they'll invent a better idiot..."
 |  | 
	
		| Back to top |     | 
	
		|  | 
	
		| Goatie.dk -
 
 
 Joined: 11 Feb 2005
 Posts: 125
 Location: Denmark > Herning
 
 | 
			
				|  Posted: Thu Mar 30, 2006 12:54 am    Post subject: |   |  
				| 
 |  
				| Thanks for the reply :) _________________
 The insane dane who loves AWS :D
 http://home.goatie.dk
  <- pic = online.. no pic, guess ;P |  | 
	
		| Back to top |     | 
	
		|  | 
	
		|  |