Rich Wales wrote:
> I did find some generally suspicious things in my web server logs --
> including lots of clients looking for the following item:
> 
>         /nette.micro?callback=shell_exec&cmd=ifconfig
> 
> but there isn't any /nette.micro anywhere on my server, and all these
> GET requests failed with 404 or 302 SMTP response codes.

If the web server logs said it was 404 then that is an HTTP 404 return
code and not an SMTP 404 return code since it is in the web server
logs not the smtp server logs.

    https://en.wikipedia.org/wiki/HTTP_404

That's the normal response to a probe.  There are a lot of probes of
web servers on the net.

    rwp@havoc:/var/log$ awk '$9=="404"' /var/log/nginx/access.log | wc -l
    1124

That's one day of log file on one of my systems.  The probes are
endless.  Script kiddies.  It's why we can't have nice things.

Examples of the types of probes.  None of these are a problem on my
system but malicious attackers probe to see if there are any
vulnerabilities.  These are probes.

    GET /data/admin/allowurl.txt
    GET /html/public/index.php
    GET /phpinfo.php
    GET /wp-config.php
    GET /wp-content/plugins/wp-file-manager/readme.txt
    GET /wp-login.php
    POST /wp-admins.php

The best thing you can do for these is to configure 'fail2ban' to
watch those log files and to drop the malicious probes at the firewall
level.  I think most of us would not do without fail2ban!

The HTTP 302 responses need more investigation before an analyses
could be made however.  Because for example they might be simply a
normal http redirection from http to https.  Or similar.  So they all
might turn out to be perfectly normal.  You would have to look and
see.

Bob

Reply via email to