[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Raq4 Intrusion



>
> Hi
> Any ideas on nature of this intrusion:-
>  "GET /scripts/root.exe?/c+dir HTTP/1.0" 302 228 "-" "-"
>  "GET /MSADC/root.exe?/c+dir HTTP/1.0" 302 226 "-" "-"
>  "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 302 236 "-" "-"
>  "GET /d/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 302 236 "-" "-"

etc. etc.

This is code red, isn't it. A virus that lives in microsoft webservers. The
real question is: anyone got a good idea to get rid of them?

For now, I just try make webalizer to ignore lines like that by putting in:

IgnoreURL       /scripts/..*

Just to get more realistic hitcounts for them. Not really succesful. It
seams webalizer is counting not found hits (which I think is strange).

But in the meantime logs are overflowing, and this virus just does not seem
to die.

Any thoughts?

Jelmer
-----------------------------------------------------------------
  Jelmer Jellema - Spin in het Web
  www.spininhetweb.nl
  Spin in het Web: Alle Touwtjes In Handen
-----------------------------------------------------------------

Spin in het Web is de producent van:
www.visinhetnet.nl: Niet Het Laatste Nieuws