Re: What is someone trying to do?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Sun, Jun 12, 2011 at 1:49 PM, ken <gebser@xxxxxxxxxxxx> wrote:
> That's interesting and useful in its way.  But I'd prefer to use the
> same scripts used by the actual crackers/bots.  Not only would I be able
> to test my sites with them, but I'd be able to recognize the
> probes/attacks when they appear in logs as they did for Jason.

There are many different scripts out there.  I never bothered trying
to find the scripts, just keep an eye on the web server logs,
/var/log/secure and the syslog.

When you see attempts to fetch things that are not installed on your
system it is usually someone up to no good.

Mike
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux