Alex,
The series of GET log entries you posted is characteristic
of a Nimda attempt to infect a server. We've all been
hammered with them for the past 2 or 3 weeks.
It is a trail of (you hope failed) attempts to find
specific vulnerabilities on your server.
> #Software: Microsoft Internet Information Services 5.0
> #Version: 1.0
> #Date: 2001-10-03 01:25:59
> #Fields: time c-ip cs-method cs-uri-stem sc-status
> 01:25:59 203.173.177.17 GET /scripts/root.exe 404
> 01:26:02 203.173.177.17 GET /MSADC/root.exe 404
> 01:26:05 203.173.177.17 GET /c/winnt/system32/cmd.exe 404
> 01:26:09 203.173.177.17 GET /d/winnt/system32/cmd.exe 404
> 01:26:12 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 200
I am not an expert about this, but to me the above line is alarming
because of the status "200"
It means it looked for *AND FOUND* a copy of "cmd.exe" on your server
in an accessible place.
cmd.exe is the NT command shell. an intruder could send
commands to it by running it like a CGI script.
> 01:27:01 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 01:27:51 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 01:27:54 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 01:59:57 203.173.177.17 GET /scripts/root.exe 404
> 02:00:01 203.173.177.17 GET /MSADC/root.exe 404
> 02:00:08 203.173.177.17 GET /c/winnt/system32/cmd.exe 404
> 02:00:12 203.173.177.17 GET /d/winnt/system32/cmd.exe 404
> 02:00:17 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 200
again another hit.
What's strange here is that these log entries ALL come
from 203.173.177.17.
Normally you will see a group of 16 probes from the same IP.
But then subsequent attempts will come from different IPs.
Is it possible this is happening from behind a firewall, and that
203.173.177.17 is a peer (on your network) that is also behind the
firewall? Maybe you're being probed by some other machine on
your network?
> 02:01:10 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 02:01:13 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 02:01:18 203.173.177.17 GET /scripts/..%5c../winnt/system32/cmd.exe 502
> 02:01:22 203.173.177.17 GET /scripts/..%5c../Admin.dll 500
> 02:01:27 203.173.177.17 GET
> /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 200
> 02:01:29 203.173.177.17 GET
another successfull attempt to find cmd.exe
> /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 502
> 02:01:35 203.173.177.17 GET
> /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 502
> 02:01:38 203.173.177.17 GET
> /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 502
> 02:01:41 203.173.177.17 GET /_vti_bin/..%5c../..%5c../..%5c../Admin.dll
500
> etc.
>
> This kind of records started to appear about 2 weeks ago.
>
> I have applied patch for IIS today.
I think the patch isn't enough if you have command shells lying around
in places where they can be reached via a URL into your document root.
I'm not sure how you find them all. They won't always be called
cmd.exe - CodeRed left something called root.exe (I think).
But at a minimum I think you want to fix things up so that the Nimda
probe suite you show in your logs fails every attempt.
>
> Any comments are welcome.
Don't underestimate this one. It's a major PITA.
Good luck.
-ns
---------------------------------------------------------------------------
New Zealand Delphi Users group - Offtopic List - [EMAIL PROTECTED]
Website: http://www.delphi.org.nz
To UnSub, send email to: [EMAIL PROTECTED]
with body of "unsubscribe offtopic"
Web Archive at: http://www.mail-archive.com/offtopic%40delphi.org.nz/