I'm not familiar with apache logs... but it looks like you are being 
scanned with a web vulnerability scanner from an attacker in China.  The 
youtube string you see, I believe, is the user-agent string supplied by the 
scanning host.

Compile all the URL requests and setup a cdb list in OSSEC.  Then setup an 
active response based on the URL requested to block the offending IP 
address.  The rule will look something like the following.

<rule id="184780" level="12">
  <if_sid>31100</if_sid>
  <list field="url">lists/urlblacklist</list>
<description>Web Vulnerability Scanner Detected</description>
</rule>

and active response... assumes firewall-drop command will actually block 
the attacker at your perimeter.

    <command>firewall-drop</command>
    <location>server</location>
    <rules_id>184780</rules_id>
    <timeout>300</timeout>
    <repeated_offenders>2,10,60,120,1440</repeated_offenders>
  </active-response>

Now all you need is the list and testing :)





On Monday, October 5, 2015 at 4:25:18 AM UTC-7, theresa mic-snare wrote:
>
> Hi all,
>
> it's my weekly ossec question post ;)
>
> maybe you can help shed some light onto this one, as I'm not really good 
> with HTTP/Apache return codes.
> I have tons of these types of requests in my current Apache webserver log
>
> 125.122.211.198 - - [15/Sep/2015:00:50:58 +0200] "GET /admin.cgi 
> HTTP/1.0" 403 5 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { 
> goo;}; echo Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 -
>  7`"
> 125.122.211.198 - - [15/Sep/2015:00:50:50 +0200] "GET 
> /catalog/index.cgi HTTP/1.0" 403 5 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:49 +0200] "GET /cart.cgi HTTP/1.0" 403 5 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:49 +0200] "GET /cartcart.cgi HTTP/1.0" 403 5 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:48 +0200] "GET /bigconf.cgi HTTP/1.0" 403 5 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:47 +0200] "GET /bandwidth/index.cgi HTTP/1.0" 
> 403 5 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:47 +0200] "GET /b2-include/b2edit.showposts.php 
> HTTP/1.0" 403 5 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { 
> goo;}; echo Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 -
>  7`"
> 125.122.211.198 - - [15/Sep/2015:00:50:46 +0200] "GET 
> /axis-cgi/buffer/command.cgi HTTP/1.0" 403 5 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:45 +0200] "GET /apps/web/vs_diag.cgi HTTP/1.0" 
> 403 5 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:45 +0200] "GET /analyse.cgi HTTP/1.0" 403 2790 
> "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { goo;}; echo 
> Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 - 7`"
> 125.122.211.198
>  - - [15/Sep/2015:00:50:44 +0200] "GET /aktivate/cgi-bin/catgy.cgi 
> HTTP/1.0" 404 8436 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { 
> goo;}; echo Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 -
>  7`"
> 125.122.211.198 - - [15/Sep/2015:00:50:43 +0200] "GET /agora.cgi
>  HTTP/1.0" 404 8436 "https://www.youtube.com/watch?v=FoUWHfh733Y"; "() { 
> goo;}; echo Content-Type: text/plain ; echo ; echo shellshot_`expr 1344 -
>  7`"
>
> what are these doing except trying to call a youtube video?
> I was once told that the GET requests are not as harmful as the POST 
> requests...
>
> I suppose it's just some script kiddie running a webserver attack script.
> should I worry?
>
> how to block these?
>
> I have a couple of other request types as well, but they all follow the 
> same pattern.
>
> best,
> theresa
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to