- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- Re: Apache Hack on port 80
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 01:10 AM
04-19-2004 01:10 AM
RPM
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 01:11 AM
04-19-2004 01:11 AM
Re: Apache Hack on port 80
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 01:48 AM
04-19-2004 01:48 AM
Re: Apache Hack on port 80
That's right if you're using your Apache server only for serve your intranet. If your server is a public one, that does not make any sense... ;-)
If you're serving only your intranet, it'd be a good idea to configure your firewall to filter out all the incoming traffic to port 80.
My two cents...
-- Wayfarer
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 01:52 AM
04-19-2004 01:52 AM
Re: Apache Hack on port 80
Apart from the IP address point you raise above, hacks against web servers tend to be pretty obvious when you find them. They tend to attempt to run things (usually ending in .exe" that have failed. Failing that, they will contain a URL that doesn't make sense or contains perl/shell or possibly even very large, ugly looking numbers but usually something fairly obvious like that.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 04:05 AM
04-19-2004 04:05 AM
Re: Apache Hack on port 80
This will show up in error logs and can be ignored. Hack attacks will create files, gain access and start changing things.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 05:00 AM
04-19-2004 05:00 AM
SolutionYou can find them by:
cat /var/log/httpd/access_log | grep cmd.exe
or
cat /var/log/httpd/access_log | grep SEARCH./
Replace the path to access_log to whatever you're using.
You'll know the buffer overflow attempts when you see them because they can be more than 32,000 characters long.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 02:14 PM
04-19-2004 02:14 PM
Re: Apache Hack on port 80
other typical hack attempts include:
GET /_vti_bin/....
GET /_mem_bin/....
GET /scripts/root.exe....
GET /MSADC/root.exe....
GET /default.ida.....
GET /sumthin....
GET /scripts/nsiislog.dll
Greetings, Martin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2004 03:05 PM
04-19-2004 03:05 PM
Re: Apache Hack on port 80
otherwise, if you dont want to use snort, check also for possible "external include" hacks. if you find urls ending with "=http://xyz.dyndns.org/hack.cgi" or something like that check if the accessed file allows external includes.
the other comments from authors above are also important to check. if you see alot of "x03x73x82x03x73" in your access_log there are possible intrusions going on.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-06-2005 06:51 AM
02-06-2005 06:51 AM
Re: Apache Hack on port 80
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-06-2005 11:18 PM
02-06-2005 11:18 PM
Re: Apache Hack on port 80
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-07-2005 12:35 AM
02-07-2005 12:35 AM
Re: Apache Hack on port 80
Your profile is accessable via google also. So what is the point?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-01-2005 03:42 PM
03-01-2005 03:42 PM
Re: Apache Hack on port 80
Sorry, I meant it to be a question, not a point.
Thanks,
Chris.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-02-2005 03:37 AM
03-02-2005 03:37 AM
Re: Apache Hack on port 80
You should watch out for people trying to POST things to Your server, i.e. to /tmp or shared memory, especially if the server is not chrooted. (failed) buffer overflow attacks appears as very long strings of garbage in the access.log. You should be aware that a successful attack will include removing it's traces. :)
The best point for learning about possible angles of attack would be apache-specific mailing lists where You can get some insight from people that survived attacks.
for the very least, I always try to
- mount $TMPDIR (usually /tmp) noexec,nosuid,nodev
- chroot apache
- run apache on port 8080 only and ipforward 80->8080 (this means no part of apache has root permissions left
- of course run the most current apache version (2.0.53 today)
- have another non-apache webserver at hand in case there are unresolvable problems.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-02-2005 04:17 AM
03-02-2005 04:17 AM