One of our clients was sending out spam unknowingly yesterday. I spent most of my afternoon cleaning it up, tracking down how the attackers were doing it.
In this clients case, they have their own server (which we maintain), and they mostly write their own code.
Most of the common garden variety vulnerability scans don’t work on their server, because they write their own code, although in this case it didn’t save them from being exploited.
In order to find out what was causing the spamming, I had to find out how the attackers got in.
Usually this means a check of the apache logs to check for anything untoward.
In this case, although the logs had plenty of vulnerability scans (which were to files that don’t exist on their server), I couldn’t see anything in the logs that immediately stuck out as being the cause.
Read more »
11
Some remote exploit analysis
Foreword – Note that none of our servers are vulnerable to remote inclusion attacks.
For the most part, most of the exploits I covered in yesterdays post are common garden php vulnerability scans.
Some of them are more interesting though, although more for being encrypted, than anything else.
If I take an example from our log files:
Read more »
9
Hacker attacks on the rise (Its those damn American’s mostly, attacking us poor Chinese users)
I’ve noticed a lot more hacker attacks in the logs for the servers we maintain recently.
This is probably due to more people using Botnets for attack scan’s.
What are the hackers looking for, and how can we prevent them getting in?
In most cases, the hackers are looking for vulnerabilities in common applications. The most notorious of these would be things like PHPBB, WordPress, and other similar apps. The most common attacks we are noticing these days are ones that leverage remote inclusion of files.
Read more »
30
The Spyware Wars
(This is a rough draft, so excuse the lack of editing and / or coherence at points)
The news this week is full of alleged government interference with a certain exiled government leaders computers.
While there is sufficient evidence of targeting by state sponsored actors, I don’t necessarily agree with everything they wrote in the report, or all their findings. While there is merit to discussion about that, its probably safer to avoid the topic, and examine how the attacks worked, and what we can do to avoid or mitigate events like that.
The actual report can be read here in PDF format – http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.html
27
Speeding up Apache
When I get time, I go through the logs and check out how the servers are doing.
One thing that I haven’t really done recently is to optimize the way things are configured.
The typical solution in most scenario’s is to throw faster hardware at things (something we do when necessary!), but sometimes a few minutes configuration can help speed things up tremendously.
Below are some tips for optimizing apache a little.
The notes below are more for my benefit, but others may get some use out of it.
We use debian for our system, and are loosely based on the qmail setup over at http://qmail.jms1.net / http://qmailrocks.org
Read more »
26
How to use 360 Safe
Ok I’ll be the first to admit it, I’m a recalcitrant Mac user now thats quite happy to never use Windows again, especially after the mess that is Vista. That said, we still have a good proportion of clients that haven’t been assimilated^H converted to Apple.
For at least the last 2 years, I’ve been telling people to use 360Safe antispyware software if they have the dreaded lurgy, er I mean Windows.
The number one issue people have is that its all in Chinese.
While its fun to say “It’s all Chinese to me”; or as my family back home like to rib me with the perenially popular in South Africa – “Howzit my China”*, people do have a point.
*Yes, I know thats totally irrelevant, but I had to throw it in somewhere
So, without further ado or waffle masquerading as informative writing, I present to you below: Read more »
Windows XP usually plays nicely, but occasionally you do the odd recalcitrant box that doesn’t want to play nice with the other computers, and share.
If you’ve ruled out the Windows Firewall (Make sure that Windows File Sharing has a checkbox in there for allowed), and everything else looks correct, but it still isn’t working, try the following:
The last few months has seen a resurgence of better than average fake RMB notes circulating around town.
As is usual, Bank ATM’s are also known to be doling out fakes, so be careful, and get money from the counters where possible.
According to various sources, most of the fakes this time around appear to be coming in from Taiwan. They first started appearing in Guangdong province, but have made their way up to the larger cities like Shanghai and Beijing now.
Archives
- November 2019
- October 2019
- August 2019
- April 2019
- February 2017
- September 2016
- June 2016
- May 2016
- September 2015
- August 2015
- June 2015
- April 2015
- December 2014
- October 2014
- September 2014
- July 2014
- June 2014
- April 2014
- October 2013
- July 2013
- May 2013
- April 2013
- March 2013
- January 2013
- December 2012
- October 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
Categories
- Apple
- Arcade Machines
- Badges
- BMW
- China Related
- Cool Hunting
- Exploits
- Firmware
- Food
- General Talk
- government
- IP Cam
- iPhone
- Lasers
- legislation
- MODx
- MySQL
- notice
- qmail
- requirements
- Reviews
- Service Issues
- Tao Bao
- Technical Mumbo Jumbo
- Things that will get me censored
- Travel
- Uncategorized
- Useful Info