1) This is a code red v2 infection attempt.
   Unfortunately web server admins are having to class these as just normal
background traffic. Please people - MAKE SURE YOU ARE PATCHED! 

Looking for holes left by CR v1

        GET /<Rejected-By-UrlScan>
        ~/scripts/root.exe 404 123 -
        2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80

Testing to see if the box is susceptible to directory traversal, tests many
times using different extended unicode chars.


GET /<Rejected-By-UrlScan> ~/scripts/..%255c../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 

2) Yes. It comes with the IISLockdown tool. If you want to know more about
URLSCAN let me know, I wrote a walkthrough of the options for someone a
while back and ill send it onto you.

3) Pissing in the wind I am afraid. It would be useful to send an email to
the person in charge of the IP address and CC it to their ISP, but don't
hold your breath.

4) MAKE SURE YOU ARE PATCHED! This is the MOST important thing you can do!
Also look at some of the IIS / Win2k hardening docs on the internet and go
through them carefully.

Just a couple of seconds of thought.

Best Regards

Nard
Please reply to : [EMAIL PROTECTED]


 


-----Original Message-----
From: Craig Brauckmiller [mailto:[EMAIL PROTECTED]] 
Sent: 10 May 2002 13:55
To: [EMAIL PROTECTED]
Subject: IIS 5 Log FIle Question




Hello all and forgive my ignorance in this area.

We are in the process of bringing our website in house.  It 
was being hosted
externally
The site is almost up and I was just poking at the logs and 
was intrigued by
what I saw.

Below is a snippet from the logs.  Can anyone tell by 
looking at it:

1.  What type of vulnerabilities were they looking for?
2.  Does the fact the it says <Rejected by urlscan> imply 
that URLScan from M$
is loaded.  I didn't do this myself...thats why I'm curious.
3.  What is the best course of action in regards to the 
individual attempting
these activities?  I traced the IP back to RoadRunner.  
Should I call their
customer service and complain or am I just pissing in the 
wind?
4.  I did run the IIS Lockdown wizard.  Is that sufficient 
for most types of
attacks?  What other tools should I consider running?

#Fields: date time c-ip cs-username s-ip s-port cs-method 
cs-uri-stem
cs-uri-query sc-status sc-win32-status cs(User-Agent) 2002-05-10 02:27:00
65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/scripts/root.exe 404 123 -
2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/MSADC/root.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/c/winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/d/winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%255c../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/_vti_bin/..%255c../..%255c../..%
255c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/_mem_bin/..%255c../..%255c../..%
255c../winnt/system32/cmd.exe 404 123 -
2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan>
~/msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%
1c../..%c1%1c../winnt/system32/cmd.exe

404 123 -
2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%c1%1c../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%c0%2f../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%c0%af../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:05 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%c1%9c../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:09 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%%35%63../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:11 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%%35c../winnt/system32/cmd.exe 404
123 - 2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%25%35%63../winnt/system32/cmd.exe
404 123 - 2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
GET /<Rejected-By-UrlScan> ~/scripts/..%252f../winnt/system32/cmd.exe 404
123 -

Thanks so much for this great list.

Craig Brauckmiller

This E-mail and its attachments have been scanned for viruses before
delivery. For more information contact [EMAIL PROTECTED]

This E-mail and its attachments have been scanned for viruses before delivery.
We recommend that all attachments are also checked by recipients before being viewed.
For more information contact [EMAIL PROTECTED]

Reply via email to