<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Hack on port 80 in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252161#M11445</link>
    <description>You need to be careful about innocuous search engine stuff verus real attacks.. A lot of search engines will assume you are running a Microsoft server and run programs they expect to find.&lt;BR /&gt;&lt;BR /&gt;This will show up in error logs and can be ignored.  Hack attacks will create files, gain access and start changing things.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Mon, 19 Apr 2004 11:05:44 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2004-04-19T11:05:44Z</dc:date>
    <item>
      <title>Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252157#M11441</link>
      <description>I was reading a previous post on hacks on port 80 and to scan the access log for suspicious activity. I am not sure what I sould be looking for that would qualify the entry as suspicious. I would like to write a script but I dont know what I am looking for. Any ideas?&lt;BR /&gt;&lt;BR /&gt;RPM</description>
      <pubDate>Mon, 19 Apr 2004 08:10:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252157#M11441</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2004-04-19T08:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252158#M11442</link>
      <description>I see that access_log starts with an IP address. Should I be looking for IPs that are outside my network?</description>
      <pubDate>Mon, 19 Apr 2004 08:11:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252158#M11442</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2004-04-19T08:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252159#M11443</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;That's right if you're using your Apache server only for serve your intranet. If your server is a public one, that does not make any sense... ;-)&lt;BR /&gt;&lt;BR /&gt;If you're serving only your intranet, it'd be a good idea to configure your firewall to filter out all the incoming traffic to port 80.&lt;BR /&gt;&lt;BR /&gt;My two cents...&lt;BR /&gt;&lt;BR /&gt;-- Wayfarer</description>
      <pubDate>Mon, 19 Apr 2004 08:48:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252159#M11443</guid>
      <dc:creator>F.J.Llorente Wayfarer</dc:creator>
      <dc:date>2004-04-19T08:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252160#M11444</link>
      <description>Robert,&lt;BR /&gt; &lt;BR /&gt;Apart from the IP address point you raise above, hacks against web servers tend to be pretty obvious when you find them.  They tend to attempt to run things (usually ending in .exe" that have failed.  Failing that, they will contain a URL that doesn't make sense or contains perl/shell or possibly even very large, ugly looking numbers but usually something fairly obvious like that.  &lt;BR /&gt; &lt;BR /&gt;</description>
      <pubDate>Mon, 19 Apr 2004 08:52:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252160#M11444</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2004-04-19T08:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252161#M11445</link>
      <description>You need to be careful about innocuous search engine stuff verus real attacks.. A lot of search engines will assume you are running a Microsoft server and run programs they expect to find.&lt;BR /&gt;&lt;BR /&gt;This will show up in error logs and can be ignored.  Hack attacks will create files, gain access and start changing things.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 19 Apr 2004 11:05:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252161#M11445</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-04-19T11:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252162#M11446</link>
      <description>I see many attempts  to compromise Windows servers such as a URI "GET /system32/cmd.exe"&lt;BR /&gt;&lt;BR /&gt;You can find them by:&lt;BR /&gt;&lt;BR /&gt;cat /var/log/httpd/access_log | grep cmd.exe&lt;BR /&gt;or  &lt;BR /&gt;cat /var/log/httpd/access_log | grep SEARCH./&lt;BR /&gt;Replace the path to access_log to whatever you're using.&lt;BR /&gt;&lt;BR /&gt;You'll know the buffer overflow attempts when you see them because they can be more than 32,000 characters long.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Apr 2004 12:00:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252162#M11446</guid>
      <dc:creator>Vernon Brown_4</dc:creator>
      <dc:date>2004-04-19T12:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252163#M11447</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;other typical hack attempts include:&lt;BR /&gt;&lt;BR /&gt;GET /_vti_bin/....&lt;BR /&gt;GET /_mem_bin/....&lt;BR /&gt;GET /scripts/root.exe....&lt;BR /&gt;GET /MSADC/root.exe....&lt;BR /&gt;GET /default.ida.....&lt;BR /&gt;GET /sumthin....&lt;BR /&gt;GET /scripts/nsiislog.dll&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Apr 2004 21:14:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252163#M11447</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-04-19T21:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252164#M11448</link>
      <description>if you want automated reports install snort. you can configure snort to only show you possible webservices alerts. there is also a webconsole available called ACID which shows you the snort reports in detail very easy.&lt;BR /&gt;&lt;BR /&gt;otherwise, if you dont want to use snort, check also for possible "external include" hacks. if you find urls ending with "=&lt;A href="http://xyz.dyndns.org/hack.cgi" target="_blank"&gt;http://xyz.dyndns.org/hack.cgi&lt;/A&gt;" or something like that check if the accessed file allows external includes.&lt;BR /&gt;&lt;BR /&gt;the other comments from authors above are also important to check. if you see alot of "x03x73x82x03x73" in your access_log there are possible intrusions going on.</description>
      <pubDate>Mon, 19 Apr 2004 22:05:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252164#M11448</guid>
      <dc:creator>frankb_1</dc:creator>
      <dc:date>2004-04-19T22:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252165#M11449</link>
      <description>I don't think it realy helps either when your member profile comes up on google does it, because yours is Robert.</description>
      <pubDate>Sun, 06 Feb 2005 14:51:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252165#M11449</guid>
      <dc:creator>lowster</dc:creator>
      <dc:date>2005-02-06T14:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252166#M11450</link>
      <description>Can you explain in more detail what you are saying? I have no idea what you mean.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Mon, 07 Feb 2005 07:18:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252166#M11450</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2005-02-07T07:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252167#M11451</link>
      <description>Christopher, I dont understand your point. &lt;BR /&gt;&lt;BR /&gt;Your profile is accessable via google also. So what is the point?</description>
      <pubDate>Mon, 07 Feb 2005 08:35:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252167#M11451</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2005-02-07T08:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252168#M11452</link>
      <description>"I don't think it realy helps either when your member profile comes up on google does it? because yours is Robert".&lt;BR /&gt;Sorry, I meant it to be a question, not a point.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;       Chris.</description>
      <pubDate>Tue, 01 Mar 2005 23:42:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252168#M11452</guid>
      <dc:creator>lowster</dc:creator>
      <dc:date>2005-03-01T23:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252169#M11453</link>
      <description>You don't really need to worry about attacks intended for windows servers, of course.&lt;BR /&gt;&lt;BR /&gt;You should watch out for people trying to POST things to Your server, i.e. to /tmp or shared memory, especially if the server is not chrooted. (failed) buffer overflow attacks appears as very long strings of garbage in the access.log. You should be aware that a successful attack will include removing it's traces. :)&lt;BR /&gt;&lt;BR /&gt;The best point for learning about possible angles of attack would be apache-specific mailing lists where You can get some insight from people that survived attacks.&lt;BR /&gt;&lt;BR /&gt;for the very least, I always try to &lt;BR /&gt;- mount $TMPDIR (usually /tmp) noexec,nosuid,nodev&lt;BR /&gt;- chroot apache&lt;BR /&gt;- run apache on port 8080 only and ipforward 80-&amp;gt;8080 (this means no part of apache has root permissions left&lt;BR /&gt;- of course run the most current apache version (2.0.53 today)&lt;BR /&gt;- have another non-apache webserver at hand in case there are unresolvable problems.</description>
      <pubDate>Wed, 02 Mar 2005 11:37:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252169#M11453</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-03-02T11:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Hack on port 80</title>
      <link>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252170#M11454</link>
      <description>Although this will all depend on how your network is setup, but if you are on a private network serving an intranet with a firewall between you and the outside world, there is little point in scanning for external IP numbers. All attacks have to come through your firewall, and will show up accordingly. Check your firewall logs for such attacks.</description>
      <pubDate>Wed, 02 Mar 2005 12:17:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/apache-hack-on-port-80/m-p/3252170#M11454</guid>
      <dc:creator>Paul Cross_1</dc:creator>
      <dc:date>2005-03-02T12:17:51Z</dc:date>
    </item>
  </channel>
</rss>

