<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Server logs: Attack or Accident? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724479#M753115</link>
    <description>Bill&lt;BR /&gt;&lt;BR /&gt;Is the ip address the same?&lt;BR /&gt;&lt;BR /&gt;Where is this logged? just Apache logs?&lt;BR /&gt;&lt;BR /&gt;It looks very dubious.&lt;BR /&gt;&lt;BR /&gt;Can you traceroute to the machine.&lt;BR /&gt;&lt;BR /&gt;Can you turn up the ammount of logging?&lt;BR /&gt;&lt;BR /&gt;From the time stamp - someone bored at lunchtime???&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 15 May 2002 12:49:07 GMT</pubDate>
    <dc:creator>Paula J Frazer-Campbell</dc:creator>
    <dc:date>2002-05-15T12:49:07Z</dc:date>
    <item>
      <title>Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724474#M753110</link>
      <description>Incoming IP modified...&lt;BR /&gt;&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:31 +0200] "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 291&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:32 +0200] "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 289&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:32 +0200] "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 299&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:33 +0200] "GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 299&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:33 +0200] "GET /scripts/..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 313&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:33 +0200] "GET /_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 330&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:34 +0200] "GET /_mem_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 330&lt;BR /&gt;1.2.3.4 - - [15/May/2002:12:39:34 +0200] "GET /msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%1c../..%c1%1c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 346&lt;BR /&gt;&lt;BR /&gt;But I've got lots of these from inter company addresses..&lt;BR /&gt;should I report it?&lt;BR /&gt;&lt;BR /&gt;Bill&lt;BR /&gt;</description>
      <pubDate>Wed, 15 May 2002 12:34:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724474#M753110</guid>
      <dc:creator>Bill McNAMARA_1</dc:creator>
      <dc:date>2002-05-15T12:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724475#M753111</link>
      <description>Bill,&lt;BR /&gt;&lt;BR /&gt;Unless you are sure that your CGIs use these commands, I would call them as attacks. &lt;BR /&gt;&lt;BR /&gt;I follow a thumb rule. Anything that cannot recognized by me on my server is a threat until it is done so.&lt;BR /&gt;&lt;BR /&gt;2 cents,&lt;BR /&gt;-Sri</description>
      <pubDate>Wed, 15 May 2002 12:38:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724475#M753111</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2002-05-15T12:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724476#M753112</link>
      <description>Hi Bill,&lt;BR /&gt;&lt;BR /&gt; Certainly look like probes to find a way to a shell or command prompt to me.....suspicious at the least. &lt;BR /&gt;I would report it.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 15 May 2002 12:39:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724476#M753112</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-05-15T12:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724477#M753113</link>
      <description>Thanks Guys,&lt;BR /&gt;&lt;BR /&gt;I'll report it just to be on the safe side..&lt;BR /&gt;&lt;BR /&gt;What's odd, is that I'm getting them say once/ twice a week from different parts of the world...&lt;BR /&gt;&lt;BR /&gt;I was thinking perhaps it's some virus.&lt;BR /&gt;&lt;BR /&gt;PS the apache server is on NT, but I posted here for quicker response.&lt;BR /&gt;It's apache afterall.&lt;BR /&gt;(PS - I've no cgi)&lt;BR /&gt;&lt;BR /&gt;Later,&lt;BR /&gt;Bill</description>
      <pubDate>Wed, 15 May 2002 12:46:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724477#M753113</guid>
      <dc:creator>Bill McNAMARA_1</dc:creator>
      <dc:date>2002-05-15T12:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724478#M753114</link>
      <description>Yup, looks like Code Red virus stuff to me.&lt;BR /&gt;&lt;BR /&gt;Do you have anti-virus protection on those clients that are requesting that info?</description>
      <pubDate>Wed, 15 May 2002 12:47:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724478#M753114</guid>
      <dc:creator>John Bolene</dc:creator>
      <dc:date>2002-05-15T12:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724479#M753115</link>
      <description>Bill&lt;BR /&gt;&lt;BR /&gt;Is the ip address the same?&lt;BR /&gt;&lt;BR /&gt;Where is this logged? just Apache logs?&lt;BR /&gt;&lt;BR /&gt;It looks very dubious.&lt;BR /&gt;&lt;BR /&gt;Can you traceroute to the machine.&lt;BR /&gt;&lt;BR /&gt;Can you turn up the ammount of logging?&lt;BR /&gt;&lt;BR /&gt;From the time stamp - someone bored at lunchtime???&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 15 May 2002 12:49:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724479#M753115</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2002-05-15T12:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724480#M753116</link>
      <description>I agree with John, Code Red, nothing to really worry about since the .exe file is not there. You may want to deny this site access be means of a firewall or packet filtering however.&lt;BR /&gt;&lt;BR /&gt;GL,&lt;BR /&gt;C</description>
      <pubDate>Wed, 15 May 2002 12:54:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724480#M753116</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-05-15T12:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724481#M753117</link>
      <description>It's folks scanning for/attempting to exploit IIS/Windoze vulnerabilities - there's no effect (no worries) if you aren't running IIS or Windoze.</description>
      <pubDate>Wed, 15 May 2002 12:58:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724481#M753117</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2002-05-15T12:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724482#M753118</link>
      <description>Hi Bill:&lt;BR /&gt;&lt;BR /&gt;So sad you are being attacked by all these =))&lt;BR /&gt;&lt;BR /&gt;Seems like a virus issue for me too. I would do a small investigation before reporting this !&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Shiju</description>
      <pubDate>Wed, 15 May 2002 13:00:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724482#M753118</guid>
      <dc:creator>Helen French</dc:creator>
      <dc:date>2002-05-15T13:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724483#M753119</link>
      <description>Hi Bill&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;CODE RED&lt;BR /&gt;&lt;BR /&gt;Info here:-&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.pgp.com/research/covert/security-alerts/codered.asp" target="_blank"&gt;http://www.pgp.com/research/covert/security-alerts/codered.asp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Wed, 15 May 2002 13:32:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724483#M753119</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2002-05-15T13:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724484#M753120</link>
      <description>Bill&lt;BR /&gt;&lt;BR /&gt;Update info for your OS:_&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-033.asp" target="_blank"&gt;http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-033.asp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Wed, 15 May 2002 13:37:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724484#M753120</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2002-05-15T13:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724485#M753121</link>
      <description>It's a nimda attack, a virus install on a IIS server .&lt;BR /&gt;As you are running apache, it's safe for you. But your logs will be full of garbages...&lt;BR /&gt;</description>
      <pubDate>Thu, 16 May 2002 07:26:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724485#M753121</guid>
      <dc:creator>benoit Bruckert</dc:creator>
      <dc:date>2002-05-16T07:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724486#M753122</link>
      <description>Yup, it was confirmed as being a Nimda virus symptom..&lt;BR /&gt;&lt;BR /&gt;Later,&lt;BR /&gt;Bill</description>
      <pubDate>Thu, 16 May 2002 08:19:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724486#M753122</guid>
      <dc:creator>Bill McNAMARA_1</dc:creator>
      <dc:date>2002-05-16T08:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Server logs: Attack or Accident?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724487#M753123</link>
      <description>Hi Bill,&lt;BR /&gt;&lt;BR /&gt;Yes, it is a nimda intrusion attempt alright, originating from another nimda-compromised system.&lt;BR /&gt;&lt;BR /&gt;Being in the security response team, my group have to deal with tons of such logs to pinpoint the nimda-compromised systems. &lt;BR /&gt;&lt;BR /&gt;To aid incident response, what I did was to write CGI scripts called root.exe and cmd.exe. Within the script, the originating source IP is identified. If it is a company IP address, the script performs a check of the MAC address and the registered owner of the MAC address. If it is an external IP address, the script performs a check with the ARIN database lookup for the domain owner. Subsequently, the script sends an automated email indicating a suspected nimda-compromised system to the owner or domain owner. &lt;BR /&gt;&lt;BR /&gt;That saves us the huge administration overhead in incident response considering the number of nimda occurrences.&lt;BR /&gt;&lt;BR /&gt;For protection, if you are a firewall administrator, you can protect your servers by performing layer-7 application-layer filtering on HTTP packets by blocking all accesses to any URLs containing cmd.exe and root.exe. That blocks nimda on the HTTP level. Note that nimda worm traverses through writeable shared folders over netbios as well. For Codered, filter out all HTTP packets containing default.ida or default.idq in its payload. Other signatures to filter include readme.exe, readme.eml and admin.dll etc. You can add to the list as your know of new signatures.&lt;BR /&gt;&lt;BR /&gt;Checkpoint FW-1 does this easily using the HTTP security server which comes built-in. Some other firewalls support the filtering using third-party applications such as websense.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Sat, 18 May 2002 00:21:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/apache-server-logs-attack-or-accident/m-p/2724487#M753123</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-05-18T00:21:57Z</dc:date>
    </item>
  </channel>
</rss>

