Full Disclosure mailing list archives

Re: Anyone noticing an increase in IOS HTTP scanning?


From: "William O'Malley" <wo () andrew cmu edu>
From: womalley () cmu edu
Date: Thu, 01 Sep 2005 14:56:04 -0400

Seen it from about 380 addresses on one day.  Very little overlap in the
address ranges that they scanned and attacked.  Odd to try something so old.
Even if it's just a test, that's a pretty noisy way to do it.


On 9/1/05 2:28 PM, "John Kinsella" <jlk () thrashyour com> wrote:

This was discussed on the NANOG list this morning, people seem to think
it's somebody trying to leverage an IOS http auth vulnerability from 2001.

John

On Thu, Sep 01, 2005 at 02:23:38PM -0400, nms () metafore ca wrote:
I have been getting at least 40 IOS HTTP Unauth Command Execution scans in
the last 12 hours. Every one has come from a different source IP, but they
are all located in Korea.

They are all trying to execute GET /level/16/exec/-///pwd HTTP/1.0 .

The stupid thing is, they are trying this on a bunch of web servers.

Has anyone else seen something like this? Before last night, there had never
been one of these on this network.

Thanks.

Paul Smith


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Attachment: smime.p7s
Description:

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: