Beginning on October 10th at 1:42am CDT what was considered a pretty significant attack took place. These attack attempts were all web based. What is curious about these attacks is the number of unique strings used in the attacks. In all there were 149 unique Snort rules triggered, from 5 attacks in 14 days. There were 5 total attacks to date, none of which were the same. The last attack was the most aggressive and extensive. A compiled list of the type of Snort rules that were triggered are at the end of this email. These web servers are hardend and the attacks were not effective, not to say that sooner or later i'll get bit. I didn't want to post the actual attack strings, even though the vulnerabilities are known, I don't want to provide some one with an easy way of creating an attack. Obviously these are already scripted/automated, are these new? Has anyone else seen this? I've not seen any mention of such attacks having taken place or have I been sleeping? It's almost like some one took the Snort rules and created an attack string for each one. Attack 1 Attack Began Oct 10 01:42:41 CDT Attack Ended Oct 10 01:57:32 CDT From a .tampabay.rr.com computer 1571 connection attempts Accross 17 web servers 6 unique Snort rules triggered 82 uniques HEAD and 3 GET strings that triggered the rules Attack 2 Attack Began Oct 10 19:00:07 CDT Attack Ended Oct 10 19:03:43 CDT From a .nas-corp.com computer 693 connection attempts Accross 17 web servers 9 unique Snort rules triggered 82 uniques HEAD strings that triggered the rules Attack 3 Attack Began Oct 10 19:04:21 CDT Attack Ended Oct 10 19:10:35 CDT From a .mylinuxisp.com computer 447 connection attempts Accross 17 web servers 7 unique Snort rules triggered 26 uniques HEAD strings that triggered the rules Attack 4 Attack Began Oct 19 09:49:19 CDT Attack Ended Oct 19 09:52:29 CDT From a .apid.com computer 99 connection attempts Accross 17 web servers 4 unique Snort rules triggered 11 uniques GET strings that triggered the rules Attack 5 Attack Began Oct 24 16:14:18 CDT Attack Ended Oct 24 16:30:18 CDT From a .adsl.fx.apol.com.tw computer 4242 connection attempts Accross 17 web servers 139 unique Snort rules triggered 343 uniques GET strings that triggered the rules WEB-ATTACKS /bin/ls| command attempt WEB-CGI aglimpse access WEB-CGI AnyForm2 access WEB-CGI args.bat access WEB-CGI AT-admin.cgi access WEB-CGI bnbform.cgi access WEB-CGI campas access WEB-CGI classifieds.cgi access WEB-CGI dumpenv.pl access WEB-CGI edit.pl access WEB-CGI environ.cgi access WEB-CGI faxsurvey access WEB-CGI filemail access WEB-CGI files.pl access WEB-CGI finger access WEB-CGI formmail access WEB-CGI glimpse access WEB-CGI htmlscript access WEB-CGI info2www access WEB-CGI maillist.pl access WEB-CGI man.sh access WEB-CGI NPH-publish access WEB-CGI nph-test-cgi access WEB-CGI perl.exe access WEB-CGI perlshop.cgi access WEB-CGI pfdisplay.cgi access WEB-CGI phf access WEB-CGI php access WEB-CGI ppdscgi.exe access WEB-CGI rguest.exe access WEB-CGI rsh access WEB-CGI rwwwshell.pl access WEB-CGI survey.cgi access WEB-CGI test-cgi access WEB-CGI testcounter.pl access WEB-CGI uploader.exe access WEB-CGI view-source access WEB-CGI visadmin.exe access WEB-CGI w3-msql access WEB-CGI wais.p access WEB-CGI webgais access WEB-CGI websendmail access WEB-CGI wguest.exe access WEB-CGI whoisraw access WEB-CGI win-c-sample.exe access WEB-CGI wrap access WEB-CGI wwwadmin.pl access WEB-CGI wwwboard passwd access WEB-CGI www-sql access WEB-COLDFUSION cfmlsyntaxcheck.cfm access WEB-COLDFUSION exampleapp access WEB-COLDFUSION exampleapp application.cfm WEB-COLDFUSION expeval access WEB-COLDFUSION exprcalc access WEB-COLDFUSION fileexists.cfm access WEB-COLDFUSION getfile.cfm access WEB-COLDFUSION snippets attempt WEB-COLDFUSION startstop DOS access WEB-FRONTPAGE administrators.pwd WEB-FRONTPAGE authors.pwd access WEB-FRONTPAGE dvwssr.dll access WEB-FRONTPAGE form_results access WEB-FRONTPAGE form_results.htm access WEB-FRONTPAGE fourdots request WEB-FRONTPAGE fpadmcgi.exe access WEB-FRONTPAGE fpadmin.htm access WEB-FRONTPAGE fpremadm.exe access WEB-FRONTPAGE orders.htm access WEB-FRONTPAGE orders.txt access WEB-FRONTPAGE register.htm access WEB-FRONTPAGE register.txt access WEB-FRONTPAGE registrations.htm access WEB-FRONTPAGE registrations.txt access WEB-FRONTPAGE service.pwd WEB-FRONTPAGE shtml.dll access WEB-FRONTPAGE shtml.exe access WEB-FRONTPAGE users.pwd access WEB-IIS .... access WEB-IIS admin access WEB-IIS .asp access WEB-IIS asp-dot attempt WEB-IIS CGImail.exe access WEB-IIS CodeRed v2 root.exe access WEB-IIS fpcount access WEB-IIS global-asa access WEB-IIS iissamples access WEB-IIS ISAPI .ida attempt WEB-IIS ISAPI .idq access WEB-IIS ISAPI .idq attempt WEB-IIS ISAPI .printer access WEB-IIS jet vba access WEB-IIS _mem_bin access WEB-IIS msadc/msadcs.dll access WEB-IIS /msadc/samples/ access WEB-IIS msdac access WEB-IIS MSProxy access WEB-IIS newdsn.exe access WEB-IIS Overflow-htr access WEB-IIS SAM Attempt WEB-IIS /scripts/samples/ access WEB-IIS search97.vts access WEB-IIS site server config access WEB-IIS Unicode2.pl script (File permission canonicalization) WEB-IIS uploadn.asp access WEB-IIS _vti_inf access WEB-MISC /.... WEB-MISC adminlogin access WEB-MISC apache DOS attempt WEB-MISC ax-admin.cgi access WEB-MISC bigconf.cgi access WEB-MISC cachemgr.cgi access WEB-MISC cart 32 AdminPwd access WEB-MISC /cgi-bin/jj attempt WEB-MISC convert.bas access WEB-MISC count.cgi access WEB-MISC counter.exe access WEB-MISC cpshost.dll access WEB-MISC Domino catalog.ns access WEB-MISC Domino domcfg.nsf access WEB-MISC Domino domlog.nsf access WEB-MISC Domino log.nsf access WEB-MISC Domino names.nsf access WEB-MISC Ecommerce checks.txt access WEB-MISC Ecommerce import.txt access WEB-MISC /etc/passwd WEB-MISC get32.exe access WEB-MISC handler access WEB-MISC .htaccess access WEB-MISC .htpasswd access WEB-MISC http directory traversal WEB-MISC Lotus EditDoc attempt WEB-MISC mall log order access WEB-MISC order.log access WEB-MISC piranha passwd.php3 access WEB-MISC plusmail access WEB-MISC queryhit.htm access WEB-MISC /~root WEB-MISC shopping cart access access WEB-MISC showcode access WEB-MISC ultraboard access WEB-MISC viewcode access WEB-MISC webcart access WEB-MISC webdist.cgi access WEB-MISC ws_ftp.ini access WEB-MISC .wwwacl access WEB-MISC wwwboard.pl access -- .~. /V\ /( )\ ^^-^^ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Fri Oct 25 2002 - 16:13:44 PDT