Solved

Webserver being used as a Proxy

Posted on 2004-08-09
2
199 Views
Last Modified: 2010-03-04
One of our Client's has a webserver that runs on Mandrake and is using Apache. I am not a Linux guru but I can navigate my way around. I did figure out that the server was being used as a proxy by looking in the httpd/error_log. There are Proxy errors in there and you can see where someone is trying hack some yahoo logins. Or they are logging in on them.

My situation is that our Linux guru is on the road and will not be available to look at it for several hours. We have shut off the IP's that they were coming in through. So my question is two-fold. One, how do I find out what version of Apache they are using. I am guessing that it was a vulnerability there that is the issue. Two, has anyone else seen this before and do you know what service might be used for the proxy? SSH and HTTP/S were all open.
0
Comment
Question by:kevinlw1974
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
ronan_40060 earned 500 total points
ID: 11761603
Hello kevin
In linux  to find out the version of apache that you have installed
go to the bin directory of apche on your OS once your in there
i.i /usr/local/apache/bin
type ./httpd -v

you should see the version of apache installed

good luck
ronan
0
 

Author Comment

by:kevinlw1974
ID: 11763019
Thanks, we were able to track down the issue even further. But you staill answered my question so you get credit :)

The issue is that Mandrake had the mod_perl running with Apache and I guess an Apache vulnerability was exploited. They had a perl proxy running some bots.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As Wikipedia explains 'robots.txt' as -- the robot exclusion standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to prevent cooperating web spiders and other web robots from accessing all or part of a websit…
It is possible to boost certain documents at query time in Solr. Query time boosting can be a powerful resource for finding the most relevant and "best" content. Of course the more information you index, the more fields you will be able to use for y…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question