Steve,

There have been quite a few url attacks recently. They automated the attacks by setting up http://...... as a url parameter, and they came about every hour under different IP addresses too. If your url uses the userreferencekey and they set userreferencekey=http://..... you will see the expiration of the key in the log. In our case, we have automated a process to block these IPs.

MC

At 08:40 PM 3/18/2008, you wrote:
HI,

Just thought I would resurrect this thread. A few developers mentioned they are seeing the same thing. I was looking at a Witango log and discovered the following.

18/03/2008 22:22:04 <mailto:[EMAIL PROTECTED]://www.insanechicken.com//phpMyAdmin/libraries/ludeme/gakacag/>[EMAIL PROTECTED]://www.insanechicken.com//phpMyAdmin/libraries/ludeme/gakacag/ 0 [Expired] Variables for key <mailto:[EMAIL PROTECTED]://www.insanechicken.com//phpMyAdmin/libraries/ludeme/gakacag/>[EMAIL PROTECTED]://www.insanechicken.com//phpMyAdmin/libraries/ludeme/gakacag/

How are these guys creating a (I assume) userreferencekey equal to their url? Is this a problem?

Just curious. Maybe worried!

Steve Fogelson


----------
From: Fogelson, Steve [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 28, 2008 9:44 AM
To: [email protected]
Subject: Witango-Talk: Curiuos

Hi,

Here is a sample of urls that are being submitted to some of my sites. They are reported as errors as I'm using Scott's error reporting routine.

<http://www.xxxxxx.com/Category/2lvl1lstbx.taf?Master_ID=http%3A%2F%2Fwww.felixtorresycia.com%2Fadmin%2Fcorreo%2Fenaq%2Fecib%2F&cat=150>www.xxxxxx.com/Category/2lvl1lstbx.taf?Master_ID=http%3A%2F%2Fwww.felixtorresycia.com%2Fadmin%2Fcorreo%2Fenaq%2Fecib%2F&cat=150

www.xxx.com/main.taf?Cat=http%3A%2F%2Fwww.tureksfuar.com.tr%2Fjoomla%2Fmambots%2Fcontent%2Fugi%2Fvipo%2F&RD=1&_start=

<http://www.xxxx.com/custom.taf?cpage=http%3A%2F%2Fsahel55.com%2Farticles%2Fomaduro%2Fkimumid%2F>www.xxxx.com/custom.taf?cpage=http%3A%2F%2Fsahel55.com%2Farticles%2Fomaduro%2Fkimumid%2F

I checked the ip address and they are coming from Amsterdam. Does this look like possible "cross-scripting" attempts or some other "hack" on their part?

Some time back I had to resort to white-listing ip addresses on my ftp servers as brute force account and password attacks were originating from Amsterdam.

Thanks

Steve Fogelson


________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf


________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

________________________________________________________________________
TO UNSUBSCRIBE: Go to http://www.witango.com/developer/maillist.taf

Reply via email to