LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-14-2006, 09:07 PM   #1
asif2k
Member
 
Registered: Mar 2006
Location: Texas
Distribution: Fedora Project
Posts: 79

Rep: Reputation: 15
apache security question - mod_proxy?


I check my logwatch and this jerk tried to access my box using a known hack! How can check to see if my apache proxy settings are turned off or denied all? I think I should be looking into my httpd.conf file. what do I edit in the file? Do I need to worry?

Code:

Connection attempts using mod_proxy: 66.219.100.118 -> mx3.punkass.com:25: 1 Time(s)


thanks in advance
 
Old 04-16-2006, 06:46 PM   #2
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
Mod_proxy should be off in Fedora, unless you've specifically enabled it in httpd.conf. Post the corresponding log entries for those proxy attempts from /var/log/httpd/access_log.

The default Apache response is usually to put a "200" status code in the logs which normally means a successfull attempt, however Apache will server *your* default index.html page instead of the content they were try to proxy. The way to tell the difference is by looking at the size of the data transmitted and seeing if it's the same size as your default homepage.

If you are really paranoid (or curious) you can also tinker around using telnet on port 80 and try to transmit the raw html CONNECT method.
 
Old 04-17-2006, 11:00 AM   #3
asif2k
Member
 
Registered: Mar 2006
Location: Texas
Distribution: Fedora Project
Posts: 79

Original Poster
Rep: Reputation: 15
yup, it is already turned off by default. you were right. do you know what kind of cracking method is this?

Code:
 \\x90\\x90\\x90\\x90
 
Old 04-17-2006, 03:25 PM   #4
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
There should likely be more to the malicious URL than that. x90 is the intel opcode for "no operation" or NOP. Putting many of them together into a "NOP Sled" is a trick used by exploit writers to inject exploit code without having to specifically define the exact boundaries where the buffer overflows into the return address. So basically it's used as padding before the actual exploit payload.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Apache + Mod_proxy ProxyPass paul_mat Linux - Networking 2 04-14-2006 08:57 PM
Apache 1.3 mod_proxy no cache mago Linux - Software 0 04-07-2006 12:39 PM
Apache mod_proxy Proxy Pass dancarl Linux - Software 0 08-15-2005 11:10 AM
Mod_Proxy (Apache) won't forward requests bentman78 Linux - Software 1 04-20-2004 08:49 AM
Webmin Through Apache using mod_proxy... ech310n Linux - General 0 01-28-2004 04:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:17 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration