Re: attacked? hacked? help.....!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


On Mon, 8 Dec 2003, Lisa Durham wrote:
> I am very new to Linux but was poking around in my newly setup Fedora 
> Core 1 system today and came upon the lines below in the Apache Access 
> Log when I used the "System Logs" icon in the System Tools Menu.

> What does this file tell me? Am I paranoid, or was someone trying to 
> access my machine (but ignorantly assuming it was a Windows machine)?
> quoted Apaches Access Log:
> - - [07/Dec/2003:14:39:47 -0600] "GET 
> /scripts/root.exe?/c+dir HTTP/1.0" 404 327 "-" "-"

As I looked back at your message I should have started closer to
the beginning.

Your system is running the apache web server "httpd".
You  can verify this thus:
   # chkconfig --list | grep http
   httpd           0:off   1:off   2:on    3:on    4:on    5:on    6:off

You might read this as the "httpd" daemon will be launched by the
system at run levels 2, 3, 4, and 5.  Run level 3 or 5 are the
standard normal run levels.

You can stop the daemon:
   /etc/init.d/httpd stop

You can keep it from being restarted the next time you boot
    # chkconfig httpd off
    # chkconfig --list | grep http
    httpd           0:off   1:off   2:off   3:off   4:off   5:off  6:off

The log messages you sent were likely the result of a long list
of old and new attacks looking for an ill managed and unpatched
web-servers of any type,  mostly Microsoft software.

So, Yes someone was attempting to access your machine and hack it.
You are not paranoid but it helps to be paranoid on the Internet.

At a quick glance most of the lines are attacks against common
Microsoft bugs.  Your log messages are from system seeking
viruses, worms or script kiddies all looking for any open system
to hack into and attack.  Some of these worms and tools will try
all possible IP addresses.

If you watch sendmail logs and other access logs
(/var/logs/secure, and more in /var/logs) you might find other
probes looking to hijack your machine.  Most evil spam is sent
from hijacked systems of ALL types.

When installing Linux/Fedora you would have been prompted for a
security level.  Most beginners should pick 'high' security.  
Then one function at a time can be configured, enabled and
watched.  Most advanced users do the same sort of thing because
there is a period after a fresh install and before all known
patches are installed when trouble could happen.

You may wish to set up  iptables to limit access:
	# chkconfig --list | grep iptables

Look for other homework topics ;-)
	# chkconfig --list | grep on

Read all about it:

	# man httpd
	# man -k http		<--  -k for keywords
	# apropos apache	<--  apropos is equal to man -k
	# man iptables
	# man -k iptables
	# info iptables
	Google is a friend on stuff like this.

The good news is that Fedora's Apache package is in very good
shape right off the disc so you are not likely to have been

Have fun.
	T o m  M i t c h e l l
	mitch48 -a*t- yahoo-dot-com

[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux