On 2014-01-10 Fri 21:12 PM |, Jan Stary wrote:
> 
> > 2 references to hinet (chinese)
> 
> What "references"?
> What's "hinet" and how do you know it is chinese?
> 
> > > intenting to send spam (relay).
> 
> How do you know that "hinet" (whatever it is)
> was intenting to send or relay spam?
> 

Hosts in hinet have been relentlessly attacking my mail & web servers
for over 8 years. I feed them rubbish to play with, and they're still at
it this week, in spamd's log:
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected] 

Looking at some of the IP addresses:
$ host 1.34.176.248
248.176.34.1.in-addr.arpa domain name pointer 1-34-176-248.HINET-IP.hinet.net.

$ whois 1.34.176.248
...
...
netnum:        1.34.0.0 - 1.34.255.255
netname:        HINET-NET
descr:          Taipei Taiwan
country:        TW
...



Since late last year, I've noticed an increase in cgi/php probes.
I don't use scripting/CGI dynamic stuff - static html only in chroot.
HINET is one of the top offenders:

$ for ip in $(awk '/POST \/cgi-bin\/php/ { print $1 }' /var/www/logs/access_log 
| sort -u); do host $ip | fgrep -i hinet && print $ip; done

248.176.34.1.in-addr.arpa domain name pointer
1-34-176-248.HINET-IP.hinet.net.
1.34.176.248
127.59.127.59.in-addr.arpa domain name pointer
59-127-59-127.HINET-IP.hinet.net.
59.127.59.127
....
...


They've even infected iPads as probing droids:

$ fgrep 1.34.176.248 /var/www/logs/access_log
1.34.176.248 - - [20/Dec/2013:07:55:54 +0000] "POST 
/cgi-bin/php.cgi?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E
 HTTP/1.1" 404 221 teak.britvault.co.uk "-" "Mozilla/5.0 (iPad; CPU OS 6_0 like 
Mac OS X) AppleWebKit/536.26(KHTML, like Gecko) Version/6.0 Mobile/10A5355d 
Safari/8536.25"


Decoding it (http://meyerweb.com/eric/tools/dencoder/) shows this:

-d allow_url_include=on -d safe_mode=off -d suhosin.simulation=on -d 
disable_functions="" -d open_basedir=none -d auto_prepend_file=php://input -d 
cgi.force_redirect=0 -d cgi.redirect_status_env=0 -n



Which is another known PHP exploit:

"...continued scanning for CVE-2012-1823 which is a vulnerability within
PHP-CGI"

"...the attacker is attempt to use various command-line web clients
(wget/curl/fetch/lwp-get, etc...) to download the "mc.pl" script on the
remote attacker's site."

http://blog.spiderlabs.com/2013/11/honeypot-alert-more-php-cgi-scanning-apache-magikac.html


I'm no web guru, so I use HTTP (Hypertext Transfer Protocol) just for
what it was designed to do: let users transfer/GET static files.

Get safe, get static.
-- 
Craig Skinner | http://twitter.com/Craig_Skinner | http://linkd.in/yGqkv7

Reply via email to