Re: What is someone trying to do?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



> On Sun, Jun 12, 2011 at 1:49 PM, ken <gebser@xxxxxxxxxxxx (mailto:gebser@xxxxxxxxxxxx)> wrote:
> > That's interesting and useful in its way. But I'd prefer to use the
> > same scripts used by the actual crackers/bots. Not only would I be able
> > to test my sites with them, but I'd be able to recognize the
> > probes/attacks when they appear in logs as they did for Jason.
> 
> There are many different scripts out there. I never bothered trying
> to find the scripts, just keep an eye on the web server logs,
> /var/log/secure and the syslog.
> 
> When you see attempts to fetch things that are not installed on your
> system it is usually someone up to no good.
Well, I was creating ReWrite rules and directing to 301 when something came in that was not on my system, but it does involve almost daily editing of the rules to keep up with the new invalid requests that I see everyday. 

-Jason 

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux