On Wed, Sep 01, 2004 at 12:25:19AM +0200, Timo Veith wrote:
> 
> I seems to be a php issue. I 
> searched through all php files that "include" or "fopen" something ... 
> whew there are way too many.
> 
> Any ideas ?

  If you have pristine logfiles for apache you might want to look for
 suspicious parameters passed to requests recently.  Perhaps `ftp`
 or `wget` commands were used to upload the DOS / forking program
 upon your box?

  I'm sure a competant attacker would have either nuked the logs or
 used POST's for any control - but if you have some code running
 on that box which is using fopen, etc, the initial attempt might
 have been recorded.

  Failing that you could look at installing mod_security to record
 all future GET/POST arguments and payloads.  I found it fairly
 simple to backport to stable, and could probably dig out packages
 if that would be useful.

Steve
-
# The Debian Security Audit Project.
http://www.debian.org/security/audit


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to