I found this rule to detect URI's for the c99 shell.
#new kit SecFilterSelective REQUEST_URI "/c99shell.txt" SecFilterSelective REQUEST_URI "/c99.txt?" My problem is that the hackers are being more stealthy and calling the script some random name like .../myphpstuff.php. So the URI no longer helps detect it.
How could I detect "c99shell" in the actual file that apache servers? This assumes that the hacker was successfully in installing it.
I am writing an article about managed colocation (what it is, what are the benefits, how is it different from other hosting options, etc.).
What are some common questions you get from your customers regarding your managed colocation or managed services?
Do they see the value right away? Why are the hesitant? Is it clear to them which aspect of their server is under the control of the hosting company and which is still their responsibility?
I want to have a static server for my website which runs on the same machine as the dynamic server. I have read on the internet that port 8080 is a good alternative port to use.
Is common enough that it will work in all cases like port 80? And that it won't be blocked by firewalls and so on since it's not a service port (port < 1024).
After install yum on my centOS 4.4 VPS, I ran yum update and got this error:
Error: Missing Dependency: glibc-common = 2.3.4-2.25 is needed by package glibc-dummy-centos-4
When I tried to install glibc-common, I got this error:
error: Failed dependencies: glibc-common = 2.3.4-2.25 is needed by (installed) glibc-2.3.4-2.25.i686 glibc-common = 2.3.4-2.25 is needed by (installed) glibc-dummy-centos-4-2.3.4-2.25.swsoft.i386
When trying to install these other things, I get more dependency errors. I noticed that glibc-dummy-centos-4-2.3.4-2.25.swsoft.i386 was mentioned. I'm not sure what this is, but it's by SwSoft? Is this something I have to contact my provider about? Thanks.
I want to use something like PHPBB forums and using one MySQL user and database. Just wondering, what are common user permissions I should set for the user? I want to try to minimize any permissions that can cause big risk to the server security.
Here is a full list of permissions I can grant to the user (via Webmin):
-Select table data -Insert table data -Update table data -Delete table data -Create tables -Drop tables -Grant privileges -Reference operations -Manage indexes -Alter tables -Create temp tables -Lock tables
This is part 1 of a personal tragic-comic narrative starring myself, a simple, unassuming end-user of value-based web hosting services, and the supreme villain of this pathetic tale, the Iago to my Othello, would be a verminous, sub-human parasite collective disguised as a professional web-hosting company in the vicinity of Columbus, Ohio.
Speaking of Shakespeare, it seems to this humble WHT supplicant that the comedy of errors authored by the entities in question, a craven crew of possum-bellied, pigeon-brained menagerie of cubicle-dwelling subhuman troglodytes masquerading as ethical business-persons and capable hosting providers, is so egregious that if a scale of measurement is ever devised for web-hosting incompetence, it should be named after this company, in recognition of their utter incompetence and arbitrary imbecilic buffoonery disguised as reasonable technical support and customer service.
Apparently this company thinks it's more important to use their scale-encrusted rat-tails to cover up their own mistakes instead of giving reasonable responses to customer questions regarding apparent server issues.
Which brings me to my initial question:
MySQL's docs say that Error Code 28 results from lack of disk space or write permissions.
What are the common causes of this? Who has the power to control it from happening, the web host or the end user?( in this arrangement, the host is running an overloaded server and controls all of the configurations and aspects of the server while the user is using secure software with moderate usage of bandwidth and database queries).
I have additional questions in regards to a more general issue regarding failure to write/open to directories as well, but I'll wait for some responses first.
I would expect the second - to be replaced by the logged in user. The doc says, the user is logged if the document is protected. I do protect the whole directory using directory match. Without log in I fail to retrieve the document in question.
I have been using mod_security 1.9.x since it first release on apache 1.3 and apache 2.0.x, rules are great and they work perfect with no issues at all with any php-mysql website. Do you recommend using mod_security 2.0 or 2.5 ? (I do know that 2.5 does not work with apache 1.3).
using mod_security, but I believe that I have it installed correctly with some rules that should be generating entries in the security audit log. No matter what I do, I can't seem to get mod_security to generate any sort of log entries.
I am using version 2.1.7. I compiled it with no problems. In my httpd.conf file, I have the following relevant lines:
LoadFile /usr/lib/libxml2.so LoadModule security2_module modules/mod_security2.so Include conf/modsecurity/*.conf
I don't think there are any problems here, as I know it is running directives from the configuration file I edited. This is the file I'm working with:
modsecurity_crs_10_config.conf
Here are the relevant lines from the config file:
SecRuleEngine On SecRequestBodyAccess On SecResponseBodyAccess On SecResponseBodyMimeType (null) text/html text/plain text/xml SecResponseBodyLimit 524288 SecDefaultAction "phase:2,auditlog,log,pass,status:500" SecAuditEngine On SecAuditLogType Serial SecAuditLog logs/modsec_audit.log SecAuditLogParts "ABIFHZ" SecRequestBodyInMemoryLimit 131072 SecDebugLog logs/modsec_debug.log SecDebugLogLevel 3
I know that the config file is being read because when I start apache, the log files (modsec_audit.log and modsec_debug.log) are created. The problem is that the files are empty and remain empty no matter what I do. I have even tried setting permissions on the files to 777.
Here are a couple of rules I created in an attempt to generate log entries:
I put these in the same config file mentioned above. As far as I understand, the first rule should examine the request body (which would include data in POST requests) for the word, "viagra". Since my default action is phase:2,auditlog,log,pass,status:500, such requests should end up in the audit log. However, when I use a form on my site to post the word "viagra", nothing is generated in the log file.
The second rule, as far as I understand, should generate a log entry any time the IP address 1.2.3.4 is sent in the request headers. Instead of 1.2.3.4, of course, I have put in my real IP address. However, when I visit my server and browse pages, nothing is logged. I assume that my requests should generate log entries since I match the IP address.
I am currently running a few small websites that use a CMS. Two are Dragonfly and one is Joomla.
I am getting sporadic errors with both systems that, upon research, seem to be related to Apache and the mod_security module. I am getting the following error:
Code: Not Acceptable
An appropriate representation of the requested resource /somefolder/index.php could not be found on this server.
Well, I'm no idiot (although some people may tend to disagree ) and after some searching, I found that this most likely points to an Apache error. Most solutions suggest to put the following in my .htacess file for the site:
Code: <IfModule mod_security.c> SecFilterEngine Off SecFilterScanPOST Off </IfModule>
It was noted that "SecFilterScanPOST Off" may or not be necessary. I have added the above to the .htaccess for each site (all 3 sites are subdomains) and have also added it to the .htaccess that is in the root folder for the site. Nothing has worked.
So my question is, is it possible that my webhost can override my .htaacess settings with their own? This is the only explanation that I can think of. But of course, I am no expert, which is why I turn to you good folks for help once again.
I installed modsecurity from Addone module in Cpanel
When I try to apply phpshell woork good without a mistakes and I can do anything despite of the presence of protection modsecurity and disable_functions in php.ini.
Is there a particular settings add to the httpd.conf to prevent application phpshell or prevent upload it to the site?
I tried using mod_security and mod_filter together. However, when I try to filter js files, I noticed that certain pages stop working, especially those using ajax.
I have installed a new server with debian lenny 5, ISPConfig 3.0.1.1 and the newest mod_security and implemented the default rules.
I deactivated the rule detecting IP in pageheaders.
Then I got another problem. Some actions of ISPConfig are detected as "remote file access attempt", severity "critical", tag "web attack/file injection" data "/etc/"
detected by rule file crs_40 line 114, id 950005
question: how do I authorize ISPConfig and only ISPConfig to perform such requests on the server?
Trying to use an RBL with ModSecurity but this matches everything whether listed or not. SecRule REMOTE_ADDR "@rbl bb.barracudacentral.org" "log,deny,msg:'POST RBL Comment Spammer'"
What I would like to do is do an RBL lookup and any POST operations.