LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-19-2004, 10:45 AM   #1
phatboyz
Member
 
Registered: Feb 2004
Location: Mooresville NC
Distribution: CentOS 4,Free BSD,
Posts: 358

Rep: Reputation: 30
Found this in my Apache Log


Hey I go this from my apache log. I am not sure what this is, but its a broadband connection that has open and unfilterd ports. My static Ip has no domain name so he must have found my personal testing server with a port scan. What should I do (evil grin)

202.25.234.188 - - [19/Oct/2004:03:14:38 -0400] "GET /scripts/nsiislog.dll" 404
340 "-" "-"
 
Old 10-19-2004, 11:21 AM   #2
cyph3r7
Member
 
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238

Rep: Reputation: 30
doncha love Microsoft IIS scans on an Apache box

I personally like to increase my hands on education by getting to know some of the errant systems that make silly scans like this. Not advocating a hack attempt, just saying you may need to educate yourself at the expense of the offending system.
 
Old 10-19-2004, 11:32 AM   #3
bulliver
Senior Member
 
Registered: Nov 2002
Location: Edmonton AB, Canada
Distribution: Gentoo x86_64; Gentoo PPC; FreeBSD; OS X 10.9.4
Posts: 3,760
Blog Entries: 4

Rep: Reputation: 78
Everyone that runs a public webserver (including myself) collects logs full of this crap. I don't think these are actually active
script-kiddie attacks, just zombie PCs with no human interaction hammering
away at whatever box they can find.

I get lot's of log entries like:

"GET /scripts/..%255c%255c../winnt/system32/cmd.exe?/c+dir"

clearly trying to exploit a windows box. Seems to me any script kiddie that
isn't a *total* idiot will be able to figure out quite easily the OS of his
target, which leads me to believe that it is a zombie PC launching these
"attacks".

The upshot of this is that you can spend 12 hours a day manually tracking down and blocking IP
addresses, and all you really accomplish is blocking an IP, or block of IPs
used by some fool that doesn't know his wintendo box is full of viruses.

My advice: just ignore, and be thankful you run Linux. If you want to sort all
this cruft out of your logs just do something like:

# grep -v ".exe" access_log > good_log
 
Old 10-19-2004, 12:29 PM   #4
phatboyz
Member
 
Registered: Feb 2004
Location: Mooresville NC
Distribution: CentOS 4,Free BSD,
Posts: 358

Original Poster
Rep: Reputation: 30
Who ever this is their not smart leaving all these ports open.

Host (202.25.234.188) appears to be up ... good.
Initiating SYN Stealth Scan against (202.25.234.188)
Adding open port 6666/tcp
Adding open port 1025/tcp
Adding open port 21/tcp
Adding open port 49400/tcp
Adding open port 7007/tcp
Adding open port 443/tcp
Adding open port 80/tcp
Adding open port 6667/tcp
Adding open port 6668/tcp
Adding open port 2301/tcp
Adding open port 1026/tcp
The SYN Stealth Scan took 21 seconds to scan 1601 ports.
For OSScan assuming that port 21 is open and port 1 is closed and neither are firewalled
Interesting ports on (202.25.234.188):
(The 1583 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp filtered smtp
80/tcp open http
135/tcp filtered loc-srv
139/tcp filtered netbios-ssn
443/tcp open https
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1025/tcp open NFS-or-IIS
1026/tcp open LSA-or-nterm
1720/tcp filtered H.323/Q.931
2301/tcp open compaqdiag
4444/tcp filtered krb524
6666/tcp open irc-serv
6667/tcp open irc
6668/tcp open irc
7007/tcp open afs3-bos
49400/tcp open compaqdiag
Remote operating system guess: Windows XP Professional RC1+ through final release
TCP Sequence Prediction: Class=random positive increments
Difficulty=9223 (Worthy challenge)
IPID Sequence Generation: Incremental

Nmap run completed -- 1 IP address (1 host up) scanned in 27 seconds
 
Old 10-19-2004, 02:08 PM   #5
cyph3r7
Member
 
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238

Rep: Reputation: 30
and now you know why they are scanning you. They were owned a long time ago and as bulliver said, he's now a hapless drone.

I too see these in my logs and used to make the effort when I was bored to try to contact the server owner.....thats a lot of work for little to no value IMHO. Just make sure you are patched and ignore it.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Strange results in /var/log/apache/access.log subt13 Linux - Security 2 08-03-2004 01:21 PM
Apache Log rajbaxi Linux - Security 12 03-21-2004 11:28 PM
output of printk can NOT be found in /var/log/messages linshu Linux - Software 1 02-13-2004 09:06 AM
Apache Log Crashed_Again Linux - Security 5 02-01-2003 08:27 AM
Can't Log into the system it says no screens found thugzclub Linux - Software 3 04-12-2002 10:13 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:12 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration