On Mon, 26 Nov 2007, BuildSmart wrote:
To: php-install@xxxxxxxxxxxxx
From: BuildSmart <buildsmart@xxxxxxxxxxxxxxxxxx>
Subject: decode a string.
One of the sites I manage has had what appears to be some kind of attempt
to break in by appending the following to some php related url.
&highlight=%2527%252esystem(chr(101)%252echr(99)%252echr(104)%252echr(111)%252echr(32)%252echr(95)%252echr(95)%252echr(95)%252echr(73)%252echr(78)%252echr(73)%252echr(67)%252echr(73)%252echr(79)%252echr(95)%252echr(95)%252echr(95)%252echr(59)%252echr(112)%252echr(115)%252echr(32)%252echr(120)%252echr(59)%252echr(101)%252echr(99)%252echr(104)%252echr(111)%252echr(32)%252echr(95)%252echr(95)%252echr(95)%252echr(70)%252echr(73)%252echr(77)%252echr(95)%252echr(95)%252echr(95)%252echr(59))%252e%2527
How can I decode this to find out what it is?
-- Dale
Googling for esystem(chr(101)%252echr(99) returns the
following results:
http://www.google.co.uk/search?hl=en&client=firefox-a&rls=org.mozilla%3Aen-US%3Aofficial&hs=bF1&q=esystem%28chr%28101%29%25252echr%2899%29&btnG=Search&meta=
In our previous story on the Santy worm, I'd left some
comments on possible suggestions. To date, I've received
replies back stating those suggestions (public and private)
have helped tremendously. This article focuses on
mod_security's filters, however, alternative filters will
also be introduced -- some not tested, so feel free to write
back to me here or in email such that they can be improved.
What has been tested with success are the mod_security
filters, and some mod_rewrite filters. Such are borne due to
the life of Santy and Phpinclude worms.
The following code is implemented today in mod_security
against the worms that attack PHP scripts:
SecFilterSelective ARG_highlight %27
SecFilterSelective ARG_highlight %2527
SecFilter "visualcoders\.net/spy\.gif\?\&cmd"
SecFilter ":/"
SecFilter "'"
Not all of these were in practice as the worms went live,
but over the past couple days it has evolved to what is
posted above. Here are some statistics from 25 Dec, 2004 at
15:11 GMT -5 to the writing of this article.
There have been a total of 296,293 attacks received by our
servers in a 55 hour period. This is a breakdown (numbers
won't add up 100% as additional filters were added to catch
all).
HTH
Keith
[Index of Archives]
[PHP Users]
[PHP Home]
[PHP on Windows]
[Kernel Newbies]
[PHP Classes]
[Postgresql]
[PHP Books]
[PHP Databases]
[PHP SOAP]