Solved

Apache Log files, what is happening here

Posted on 2010-11-10
11
414 Views
Last Modified: 2013-11-05
I'm doing a study of log-files from an Apache server.  Here is one of the lines out of the logfiles i have.

87.118.96.104 - - [16/Jul/2008:06:28:08 +0800] "GET http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec HTTP/1.0" 400 226 "http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" "Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.6) Gecko/20050224 Firefox/1.0.2"

I would like to know why this request looks like it comes from http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" when that has nothing to do with the site.

I can see the status code returned was 400, so the request was invalid, but i'm curious to know how the p=cheap-zyrtec got there?  It is probably possible for someone to type it, but is there another way it can appear automatically?

Also what does the Gecko/20050224 Firefox/1.0.2 mean?
0
Comment
Question by:madstylex
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
11 Comments
 
LVL 14

Expert Comment

by:Monis Monther
ID: 34102993
what does the Gecko/20050224 Firefox/1.0.2 mean?

It means that the request came from someone using Mozilla FireFox browser version 1.0.2

0
 
LVL 13

Assisted Solution

by:LinuxGuru
LinuxGuru earned 200 total points
ID: 34105214
Hi,

I'm giving an example below.

Suppose you are getting an information like this : Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12

Here the details are listed below:

Browser branch name:      Firefox 3.6
Browser name:      Firefox
Browser version:      3.6
Operation System:      Windows NT 6.1 (Windows 7)
Browser full name:      Mozilla/Firefox 3.6.12
ProductSub:      20101026
Engine:      Gecko RV: 1.9.2.12
U:      Security type - strong security
en-US:      Language Tag, indicates the language for which the client had been localized (e.g. menus and buttons in the user interface) :
rv:1.9.2.12: CVS Branch Tag
The version of Gecko being used in the browser
Gecko:      Gecko engine inside

Hope this helps.
 
0
 

Author Comment

by:madstylex
ID: 34107586
Thank you testez,

That was helpful.

And what about for the first part of the question?

How could the <b>p=cheap-zyrtec</b>  getting into the referrer link?  Can anyone help me with that?
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 78

Expert Comment

by:arnold
ID: 34108866
The site/page "http://scissec.scis.ecu.edu.au/educom/themes/Prairie/images/.tmp/index.php?p=cheap-zyrtec" is presented in the HTTP/1.0 request as the Referrer site.
NT 5.0 I think is windows 2000.
i.e. you can connect to any web server make the request and then Add the Referrer: whatever_you_want
and whatever_you_want will appear in the log.

0
 

Author Comment

by:madstylex
ID: 34108954
@ arnold

Any idea why someone would do this?
0
 
LVL 78

Expert Comment

by:arnold
ID: 34109000
You need to see who had the IP: 87.118.96.104 on  [16/Jul/2008:06:28:08 +0800] and ask them.

Do you have a specific question where one can answer based on know how/knowledge versus trying to read mines/ determine motives?

0
 

Author Comment

by:madstylex
ID: 34109017
@ arnold I don't know the person on 87.118.96.104

I just wanted to know if anyone had seen something like this before.  Maybe from referrer spam or some other common issue / exploit like that.  Was just curious why someone would type something so random on a site that had nothing to do with what they were looking for.

But thank you very much for your answer!
0
 
LVL 78

Accepted Solution

by:
arnold earned 300 total points
ID: 34109049
You seem to have answered your own question this could have a been a malicious attack DDoS attack or ....  There really is no way to explain the motives behind this.  The possibility that the owners of the site http://scissec.scis.ecu.edu.au/ have/use internal IPs that are public versus private.
The visitor to the site was not local/internal and the request leaked out.

i.e. site A has the public IPs a.b.c.d Site B does not use the private IP blocks when setting up their LAN but is using the a.b.c.0/24 as one of their internal LANs.
User a connects via VPN to Site B and the a.b.c.0/24 block is for one reason or another is not part of their VPN client setting.  the user access the url http://scissec.scis.ecu.edu.au/ the IP of which is returned as a.b.c.d and instead of that request going through the VPN it is sent out and hits your server.


0
 

Author Comment

by:madstylex
ID: 34109092
Thank you!

I think it was a DDoS becuase there was tons of activity at this time and the server went down shortly after.  Also it was being hit by the same ip hundreds of time per minute, using different keywords, different, browsers, OS and languages.
Thanks again for your help, It took a little bit of discussion to get the answer :)


0
 

Author Closing Comment

by:madstylex
ID: 34109100
Thorough explanations
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Come and listen to Percona CEO Peter Zaitsev discuss what’s new in Percona open source software, including Percona Server for MySQL (https://www.percona.com/software/mysql-database/percona-server) and MongoDB (https://www.percona.com/software/mongo-…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question