Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 439
  • Last Modified:

Apache Log files, what is happening here

I'm doing a study of log-files from an Apache server.  Here is one of the lines out of the logfiles i have.

87.118.96.104 - - [16/Jul/2008:06:28:08 +0800] "GET http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec HTTP/1.0" 400 226 "http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" "Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.6) Gecko/20050224 Firefox/1.0.2"

I would like to know why this request looks like it comes from http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" when that has nothing to do with the site.

I can see the status code returned was 400, so the request was invalid, but i'm curious to know how the p=cheap-zyrtec got there?  It is probably possible for someone to type it, but is there another way it can appear automatically?

Also what does the Gecko/20050224 Firefox/1.0.2 mean?
0
madstylex
Asked:
madstylex
2 Solutions
 
Monis MontherSystem ArchitectCommented:
what does the Gecko/20050224 Firefox/1.0.2 mean?

It means that the request came from someone using Mozilla FireFox browser version 1.0.2

0
 
LinuxGuruLinux Server AdministratorCommented:
Hi,

I'm giving an example below.

Suppose you are getting an information like this : Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12

Here the details are listed below:

Browser branch name:      Firefox 3.6
Browser name:      Firefox
Browser version:      3.6
Operation System:      Windows NT 6.1 (Windows 7)
Browser full name:      Mozilla/Firefox 3.6.12
ProductSub:      20101026
Engine:      Gecko RV: 1.9.2.12
U:      Security type - strong security
en-US:      Language Tag, indicates the language for which the client had been localized (e.g. menus and buttons in the user interface) :
rv:1.9.2.12: CVS Branch Tag
The version of Gecko being used in the browser
Gecko:      Gecko engine inside

Hope this helps.
 
0
 
madstylexAuthor Commented:
Thank you testez,

That was helpful.

And what about for the first part of the question?

How could the <b>p=cheap-zyrtec</b>  getting into the referrer link?  Can anyone help me with that?
0
Increase Security & Decrease Risk with NSPM Tools

Analyst firm, Enterprise Management Associates (EMA) reveals significant benefits to enterprises when using Network Security Policy Management (NSPM) solutions, while organizations without, experienced issues including non standard security policies and failed cloud migrations

 
arnoldCommented:
The site/page "http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" is presented in the HTTP/1.0 request as the Referrer site.
NT 5.0 I think is windows 2000.
i.e. you can connect to any web server make the request and then Add the Referrer: whatever_you_want
and whatever_you_want will appear in the log.

0
 
madstylexAuthor Commented:
@ arnold

Any idea why someone would do this?
0
 
arnoldCommented:
You need to see who had the IP: 87.118.96.104 on  [16/Jul/2008:06:28:08 +0800] and ask them.

Do you have a specific question where one can answer based on know how/knowledge versus trying to read mines/ determine motives?

0
 
madstylexAuthor Commented:
@ arnold I don't know the person on 87.118.96.104

I just wanted to know if anyone had seen something like this before.  Maybe from referrer spam or some other common issue / exploit like that.  Was just curious why someone would type something so random on a site that had nothing to do with what they were looking for.

But thank you very much for your answer!
0
 
arnoldCommented:
You seem to have answered your own question this could have a been a malicious attack DDoS attack or ....  There really is no way to explain the motives behind this.  The possibility that the owners of the site http://scissec.scis.ecu.edu.au/ have/use internal IPs that are public versus private.
The visitor to the site was not local/internal and the request leaked out.

i.e. site A has the public IPs a.b.c.d Site B does not use the private IP blocks when setting up their LAN but is using the a.b.c.0/24 as one of their internal LANs.
User a connects via VPN to Site B and the a.b.c.0/24 block is for one reason or another is not part of their VPN client setting.  the user access the url http://scissec.scis.ecu.edu.au/ the IP of which is returned as a.b.c.d and instead of that request going through the VPN it is sent out and hits your server.


0
 
madstylexAuthor Commented:
Thank you!

I think it was a DDoS becuase there was tons of activity at this time and the server went down shortly after.  Also it was being hit by the same ip hundreds of time per minute, using different keywords, different, browsers, OS and languages.
Thanks again for your help, It took a little bit of discussion to get the answer :)


0
 
madstylexAuthor Commented:
Thorough explanations
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now