Hello All,

Today,
Something caught my attention while looking for errors in log files.

[code]
root@messagerie-principale[10.10.10.19] ~ # tail -f 
/var/log/apache2/roundcube.error /var/log/fail2ban.log 
/var/log/apache2/mail.radioalgerie.dz.error /var/log/dovecot.log 
/var/log/mail.warn /var/log/auth.log /var/log/daemon.log /var/log/syslog 
/var/log/mysql/error.log /var/log/apache2/error.log | egrep -i 
'(fail|reject|error|banned|quarantine|virus|malware|detected|critic|fatal)'
==> /var/log/apache2/roundcube.error <==
[Mon Feb 13 07:44:16.915147 2023] [core:error] [pid 57379] [client 
162.241.181.215:44188] AH00126: Invalid URI in request GET /../../web.config 
HTTP/1.1
[Mon Feb 13 07:45:51.144701 2023] [core:error] [pid 57489] [client 
162.241.181.215:37200] AH00126: Invalid URI in request GET /../../web.config 
HTTP/1.1
[Mon Feb 13 08:00:31.454599 2023] [:error] [pid 58898] [client 
162.241.181.215:43894] script '/var/www/roundcubemail/xprober.php' not found or 
unable to stat
[Mon Feb 13 08:41:00.277895 2023] [core:error] [pid 64359] [client 
162.241.181.215:40784] AH00126: Invalid URI in request GET /../../web.config 
HTTP/1.1
[Mon Feb 13 08:56:03.854510 2023] [:error] [pid 1513] [client 
162.241.181.215:45126] script '/var/www/roundcubemail/login.php' not found or 
unable to stat
==> /var/log/fail2ban.log <==
==> /var/log/apache2/mail.radioalgerie.dz.error <==
[Mon Feb 13 07:59:40.234190 2023] [:error] [pid 58662] [client 
162.241.181.215:33764] script '/var/www/roundcubemail/xprober.php' not found or 
unable to stat
[Mon Feb 13 08:39:12.997684 2023] [core:error] [pid 63800] [client 
162.241.181.215:47014] AH00126: Invalid URI in request GET /../../web.config 
HTTP/1.1
[Mon Feb 13 08:55:12.770692 2023] [:error] [pid 1508] [client 
162.241.181.215:36254] script '/var/www/roundcubemail
/login.php' not found or unable to stat
Feb 13 09:26:35 messagerie freshclam[854]: ERROR: Can't download main.cvd from 
database.clamav.net
Feb 13 09:26:35 messagerie freshclam[854]: Update failed. Your network may be 
down or none of the mirrors listed in /etc/clamav/freshclam.conf is working. 
Check http://www.clamav.net/doc/mirrors-faq.html for possible reasons.
Feb 13 09:29:44 messagerie smartd[857]: Device: /dev/sda, failed to read 
Temperature
Feb 13 09:29:44 messagerie smartd[857]: Device: /dev/sdb, failed to read 
Temperature
[/code]

In particular,

[code]
[Mon Feb 13 08:00:31.454599 2023] [:error] [pid 58898] [client 
162.241.181.215:43894] script '/var/www/roundcubemail/xprober.php' not found or 
unable to stat
[/code]

I looked again at the logs,
and found that this particular IP was scanning my webmail for vulnerabilities.

[code]
root@messagerie-principale[10.10.10.19] /var/log # grep 162.241.181.215  
/var/log/apache2/roundcube.access | head
162.241.181.215 - - [13/Feb/2023:06:33:37 +0100] "GET /.ftpconfig HTTP/1.1" 301 570 "-" 
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/52.0.2762.73 Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:34:26 +0100] "GET /.ftpconfig HTTP/1.1" 301 594 "-" 
"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2309.372 
Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:34:51 +0100] "GET /google-services.json HTTP/1.1" 404 5101 
"-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.2309.372 
Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:34:52 +0100] "GET /app/google-services.json HTTP/1.1" 404 5105 
"-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2224.3 
Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:34:52 +0100] "GET /android/app/google-services.json HTTP/1.1" 
404 5113 "-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/35.0.3319.102 Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:35:26 +0100] "GET /php.ini HTTP/1.1" 301 564 "-" 
"Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 
Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:36:13 +0100] "GET /php.ini HTTP/1.1" 301 588 "-" 
"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 
Safari/4E423F"
162.241.181.215 - - [13/Feb/2023:06:36:20 +0100] "GET /configuration.yml HTTP/1.1" 404 5098 
"-" "Mozilla/5.0 (Windows NT 4.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/37.0.2049.0 Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:36:21 +0100] "GET /config/configuration.yml HTTP/1.1" 404 5105 
"-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 
Safari/537.36"
162.241.181.215 - - [13/Feb/2023:06:36:22 +0100] "GET /redmine/config/configuration.yml HTTP/1.1" 
404 5113 "-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/35.0.2309.372 Safari/537.36"
root@messagerie-principale[10.10.10.19] /var/log #
[/code]

This is a targeted attack,
because it started at the end of last week,
at 19:11,
the guy knows that it as around that time that I leave,
and he knows that end of week in Algeria is thursday,
not friday.


[code]
root@messagerie-principale[10.10.10.19] /var/log # zgrep -l 162.241.181.215  
/var/log/apache2/roundcube.access*
/var/log/apache2/roundcube.access
/var/log/apache2/roundcube.access.1
/var/log/apache2/roundcube.access.2.gz
/var/log/apache2/roundcube.access.3.gz
/var/log/apache2/roundcube.access.4.gz
root@messagerie-principale[10.10.10.19] /var/log #
[/code]

[code]
root@messagerie-principale[10.10.10.19] /var/log # zgrep 162.241.181.215  
/var/log/apache2/roundcube.access.4.gz | head
162.241.181.215 - - [09/Feb/2023:19:11:27 +0100] "GET / HTTP/1.1" 301 550 "-" 
"Go-http-client/1.1"
162.241.181.215 - - [09/Feb/2023:19:11:30 +0100] "GET / HTTP/1.1" 200 7837 "-" 
"Go-http-client/1.1"
162.241.181.215 - - [09/Feb/2023:19:11:31 +0100] "GET / HTTP/1.1" 301 574 "-" 
"Go-http-client/1.1"
162.241.181.215 - - [09/Feb/2023:21:19:27 +0100] "GET 
/downloads/..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd HTTP/1.1" 301 716 
"-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 
Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "GET /loginsave.php?u=http://interact.sh HTTP/1.1" 
301 618 "-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) 
Chrome/36.0.1985.67 Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "GET 
/te%253Cimg%2520src=x%2520onerror=alert%2842%29%253Est HTTP/1.1" 301 648 "-" "Mozilla/5.0 
(Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "GET 
/wp-content/plugins/embed-swagger/swagger-iframe.php?url=xss://%22-alert(document.domain)-%22 HTTP/1.1" 
301 734 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) 
Chrome/44.0.2403.155 Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "POST /mailingupgrade.php HTTP/1.1" 301 586 
"-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 
Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "GET /IND780/excalweb.dll?webpage=../../AutoCE.ini 
HTTP/1.1" 301 638 "-" "Mozilla/5.0 (Windows NT 6.4; WOW64) AppleWebKit/537.36 (KHTML, 
like Gecko) Chrome/41.0.2225.0 Safari/537.36"
162.241.181.215 - - [09/Feb/2023:21:19:28 +0100] "GET 
/sidekiq/queues/%22onmouseover=%22alert%28nuclei%29%22 HTTP/1.1" 301 648 "-" "Mozilla/5.0 
(Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36"
root@messagerie-principale[10.10.10.19] /var/log #
[/code]

I immediately tried to stop the IP from continuing its scan with a shorewall 
logdrop command.

[Code]
$ shorewall logdrop 162.241.181.215
[/Code]

But the IP continued to log in :

root@messagerie-principale[10.10.10.19] /var/log # tcpdump -i eth1 -q -l -n  
"(tcp[13]==2 or icmp or udp) and src net not (192.168.0.0/16 or 172.16.0.0/16 or 
10.0.0.0/8)" | tcpdump.ip.info IP_column=3
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 262144 bytes
10:28:24.841391 105.96.27.45.62125    - 10.10.10.19.443:       DZ  Tipaza       
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:24.841578 105.96.27.45.62126    - 10.10.10.19.443:       DZ  Tipaza       
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:24.873900 105.96.27.45.62127    - 10.10.10.19.443:       DZ  Tipaza       
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:26.877425 149.12.118.153.26349  - 10.10.10.19.25:        US  New York     
    PSINet, Inc.
10:28:27.915445 197.200.176.81.52833  - 10.10.10.19.443:       DZ  Bejaia       
    PLS-POOLS 197.200.128.0/19 ANIS BENAKNOUN
10:28:29.184396 38.107.124.7.34707    - 10.10.10.19.25:        US  New York     
    PSINet, Inc.
10:28:29.813726 105.96.45.148.51692   - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:29.875461 105.96.73.64.10380    - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:29.919179 105.96.73.64.3463     - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:30.700453 105.96.60.35.55994    - 10.10.10.19.443:       DZ  Skikda       
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:33.149986 162.241.181.215.58446 - 10.10.10.19.443:       US  Utah         
    Unified Layer
10:28:34.083508 105.96.61.134.20218   - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:34.142935 162.241.181.215.58446 - 10.10.10.19.443:       US  Utah         
    Unified Layer
10:28:36.142824 162.241.181.215.58446 - 10.10.10.19.443:       US  Utah         
    Unified Layer
10:28:38.277058 197.201.1.122.59377   - 10.10.10.19.443:       DZ  Alger        
    IP-FIXE pool pour plage fixe
10:28:38.387334 105.96.57.103.18009   - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
10:28:40.152838 162.241.181.215.58446 - 10.10.10.19.443:       US  Utah         
    Unified Layer
10:28:43.164360 162.241.181.215.32986 - 10.10.10.19.443:       US  Utah         
    Unified Layer
10:28:43.477101 105.96.82.133.52542   - 10.10.10.19.443:       DZ  Alger        
    PLS-POOLS IP fixe 105.96.0.0/17
^C23 packets captured
23 packets received by filter
0 packets dropped by kernel

root@messagerie-principale[10.10.10.19] /var/log #

162.241.181.215,
an IP located in Utah, USA,
was still connecting.

/var/log/messsages,
which used to be populated with shorewall ban messages,
is empty

root@messagerie-principale[10.10.10.19] /var/log # cat messages
Feb 13 06:25:06 messagerie rsyslogd: [origin software="rsyslogd" swVersion="8.4.2" 
x-pid="938" x-info="http://www.rsyslog.com";] rsyslogd was HUPed
Feb 13 06:25:19 messagerie rsyslogd0: action 'action 17' resumed (module 
'builtin:ompipe') [try http://www.rsyslog.com/e/0 ]
Feb 13 06:25:19 messagerie rsyslogd-2359: action 'action 17' resumed (module 
'builtin:ompipe') [try http://www.rsyslog.com/e/2359 ]
Feb 13 06:36:00 messagerie rsyslogd-2007: action 'action 17' suspended, next 
retry is Mon Feb 13 06:36:30 2023 [try http://www.rsyslog.com/e/2007 ]
Feb 13 10:24:04 messagerie kernel: [561655.405498] device eth1 entered 
promiscuous mode
Feb 13 10:24:09 messagerie kernel: [561660.814079] device eth1 left promiscuous 
mode
Feb 13 10:24:13 messagerie kernel: [561664.771916] device eth1 entered 
promiscuous mode
Feb 13 10:24:25 messagerie kernel: [561676.160617] device eth1 left promiscuous 
mode
Feb 13 10:25:06 messagerie kernel: [561717.262545] device eth1 entered 
promiscuous mode
Feb 13 10:25:13 messagerie kernel: [561724.786655] device eth1 left promiscuous 
mode
Feb 13 10:25:49 messagerie kernel: [561760.974065] device eth1 entered 
promiscuous mode
Feb 13 10:25:54 messagerie kernel: [561765.590239] device eth1 left promiscuous 
mode
Feb 13 10:26:48 messagerie kernel: [561819.290131] device eth1 entered 
promiscuous mode
Feb 13 10:26:51 messagerie kernel: [561822.934034] device eth1 left promiscuous 
mode
Feb 13 10:27:35 messagerie kernel: [561866.239144] device eth1 entered 
promiscuous mode
Feb 13 10:27:35 messagerie kernel: [561866.748364] device eth1 left promiscuous 
mode
Feb 13 10:28:24 messagerie kernel: [561915.696483] device eth1 entered 
promiscuous mode
Feb 13 10:28:44 messagerie kernel: [561935.822362] device eth1 left promiscuous 
mode
Feb 13 10:29:42 messagerie kernel: [561993.846244] device eth1 entered 
promiscuous mode
Feb 13 10:29:58 messagerie kernel: [562009.847237] device eth1 left promiscuous 
mode
root@messagerie-principale[10.10.10.19] /var/log #

So I checked again that the IP was really blocked by shorewall by doing a 
shorewall show dynamic

[CODE]
root@messagerie-principale[10.10.10.19] /var/log # shorewall show dynamic | tail
    0     0 logdrop    all  --  *      *       46.38.145.0/24       0.0.0.0/0
    0     0 logdrop    all  --  *      *       212.227.15.0/24      0.0.0.0/0
    0     0 reject     all  --  *      *       104.168.34.178       0.0.0.0/0
    0     0 reject     all  --  *      *       104.168.34.177       0.0.0.0/0
    0     0 reject     all  --  *      *       105.102.33.176       0.0.0.0/0
   11   660 reject     all  --  *      *       105.102.42.31        0.0.0.0/0
   20  1200 reject     all  --  *      *       105.96.195.57        0.0.0.0/0
    0     0 reject     all  --  *      *       41.108.14.140        0.0.0.0/0
  185 11100 logdrop    all  --  *      *       162.241.181.215      0.0.0.0/0

root@messagerie-principale[10.10.10.19] /var/log #
[/CODE]

"shorewall show dynamic" lists the IP that I banned.
Its target is logdrop,
but it could still connect to my machine,
and nothing is logged in /var/log/messages.

Any ideas how I could troubleshoot this further?

Best,

--
yassine -- sysadm
Viber/GSM : 00213-779 06 06 23
http://about.me/ychaouche
Looking for side gigs.


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to