-  [WT]  [Home] [Manage]

[Return]
Posting mode: Reply
Name
Email
Subject   (reply to 86)
Message
Captcha
File
Embed   Help
Password  (for post and file deletion)
  • Supported file types are: 7Z, GIF, JPG, M4A, MP3, PDF, PNG, RAR, SWF, TORRENT, TXT, XZ, ZIP
  • Maximum file size allowed is 10240 KB.
  • Images greater than 200x200 pixels will be thumbnailed.
  • Currently 170 unique user posts. View catalog

  • Blotter updated: 2012-05-14 Show/Hide Show All

File 130122554231.jpg - (28.16KB , 325x415 , ruawizard.jpg ) Thumbnail displayed, click image for full size.
86 No. 86
"GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 403 243
"GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 404 226
"GET /phpmyadmin/scripts/setup.php HTTP/1.1" 403 230
"GET /pma/scripts/setup.php HTTP/1.1" 404 219
"GET /myadmin/scripts/setup.php HTTP/1.1" 404 223
"GET /MyAdmin/scripts/setup.php HTTP/1.1" 404 223

I run Apache on one of my computers for fun and stuffs and found these on my log.

What do? Should I be concerned? I'm a noob.
Expand all images
>> No. 93
>>86

>I'm a noob.

Affirmative.

>Should I be concerned?

Negative. It's a weak scripted attack. Probably the Chinese sweeping addresses trying to get lucky.
>> No. 94
>>93
>"GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 403 243

Can you tell me what it was trying to do here?
>> No. 139
>>94
It's just a signature...
>> No. 167
File 131325293247.jpg - (31.01KB , 300x309 , 1307556258691.jpg ) Thumbnail displayed, click image for full size.
167
I systematically get the exact same shit each day on a cheap vps in Texas. What I've done is simple : a cronjob read the last 200 lines of the last apache log, and tell iptables to drop all paquets from the ip who sent the 'w00tw00t' GET request.


Delete post []
Password  
Report post
Reason  




Inter*Chan Imageboard Top List