On Fri, Mar 17, 2006 at 11:01:53AM +0100, Mark Prins wrote:
> [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> wrote on :
> 
> > On Wed, Mar 15, 2006 at 12:31:06PM +0000, Gaby vanhegan wrote:
> 
> >> 1. How do I find out their attack vector?  I have had a nessus scan
> >> performed on the machine, but it did not present any security (I can
> >> supply on request).  I've checked the security releases in
> >> security.html and there are no pertinent ones for httpd. Snort has
> >> provided little useful information (I can provide access to the
> >> snort logs if required). 
> 
> Your access log only shows the request errors (404, 408) this makes it
> useless for finding the entry point (which would be logged with 2xx)
> assuming it's httpd. 
> The error log looks kinda scary...
> btw rotating the logs makes them easier to manage)
> 
> >> 2. If I can't stop them getting in, is there any way to observe what
> >> they're doing, or how they're doing  it, so I can get a pointer to
> >> the hole. 
> >> 
> 
> >> i've run out of ideas here.  Can you help?
> > 
> > php is old, and best avoided as a matter of general principle. There
> > have been several security bugs found and fixed since 4.3.8.
> 
>  my bets are on php

Or, to be fair to the PHP developers, one of the numerous buggy apps
written in PHP.

                Joachim

Reply via email to