LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (https://www.linuxquestions.org/questions/linux-security-4/)
-   -   Apache Log file question. (https://www.linuxquestions.org/questions/linux-security-4/apache-log-file-question-174915/)

GarroteYou 04-26-2004 08:56 PM

Apache Log file question.
 
Hello,

I have a question regarding some odd log entries:

They go like this:

66.131.198.154 - - [22/Apr/2004:02:44:04 -0400] "SEARCH /\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1 \x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02 \xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1 \x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02 \xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1 \x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1\x02\xb1

* snip *

\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90 \x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" 414 339

Can anyone please explain to me what this user was trying to accomplish?

Inexactitude 04-26-2004 09:06 PM

These are various exploits (though their exact names I don't know). I think these are iis or other server exploits. I get these a lot and they seem to have no effect at all. You'll have to get used to log entries like these, becuase a lot of worms like nimba and code red are still scanning the internet, and generate log entries that look like this.

GarroteYou 04-26-2004 10:03 PM

That is what I thought, but what about the 'SEARCH' query. This is not specified in the http 1.0 or 1.1 RFC's. Is this some kind of stupid Microsoft thing?

Inexactitude 04-27-2004 02:27 PM

To tell you the truth, I have no idea where that one is from, I see it a lot too. I'll do a little research on it and see exactly what it is.

GarroteYou 04-27-2004 11:41 PM

Thanks for all of the help, I think I found what I was looking for:

http://mail.nessus.org/pipermail/nes...er/000023.html

Inexactitude 04-28-2004 02:04 PM

Okay, looks like a an iis exploit. Wow, what a suprise.

e1000 05-12-2004 12:33 AM

I have decided to send a polite but informative email to the apropriate email address informing the ISP about one of their customers attempting to attack me.

I know that one person cant make a difference, but if everyone wrote one email a day reguarding these attacks, ill bet that the hackers would eventually loose their ISP accounts due to repeated complaints.

granted, its not prison time, but better than just sitting back and waiting till they download that brand new apache exploit that all their hacker buddies are talking about.

Inexactitude 05-13-2004 05:55 PM

Well, the problem with that is that the attack probably is coming from somebody with the intent to do an attack. Chances are it's just some kind of Windows worm that somebody on a cbale modem got. You really can't expect isps to shut people down just because they're too stupid to keep their machines secure.

RWallett 10-24-2004 05:51 AM

quote: You really can't expect isps to shut people down just because they're too stupid to keep their machines secure.

Uhhh....yes, you most certainly can. I am an abuse administrator at an ISP in Alaska, and that is *exactly* what I do when I run across users that can't/won't secure their computers. In general, however, after contacting the user a few times to advise them that they have a problem and that they need to fix it or risk losing their accounts--and giving a few helpful pointers to get them on their way--my users eventually either get their computer locked down or replace it with a new one. While some of them will eventually get the new computer infected, etc. :rolleyes: a number of them learn a bit about basic security (firewall, anti-virus, anti-spyware, patching the OS, etc.), and cause no more problems.

I *really* wish ISP's could/would communicate better with PC repair shops, however. I can't tell you how many customers I have contacted where there has absolutely, positively been a problem on the customer's machine (typically, malware installed by a trojan for relaying UCE elsewhere), but the PC shop ran a quick A/V, called the computer clean, charged the customer $150 and told them they found nothing...at which point the customer calls in screaming at me because they just spent $150 on a computer that "had nothing wrong with it." And then they get *REALLY* upset when I suspend them again because they are still relaying spam... (Hint for PC repair shop employees: nmap and ethereal are your friends!)

--Mike


All times are GMT -5. The time now is 07:30 AM.