TommyWillB
Registered
I guess I was not really suprised to see a ton of request in my Apache logs that appear to be attempts at WinDoze IIS exploits:
I know these probably will not do any harm, but I nontheless managed (as a learning excercise) to get Apache to redirect all of them excepf the first two. Here is what I did:
There seems to be something very odd that confuses Apache when the URL contains either "..%.." or "..%2f..".
What is the trick to redirect these?
Code:
/c/winnt/system32/cmd.exe
/_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe
/_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe
/scripts/..%../winnt/system32/cmd.exe
/scripts/..%2f../winnt/system32/cmd.exe
/scripts/..%5c%5c../winnt/system32/cmd.exe
/scripts/..%5c../winnt/system32/cmd.exe
/scripts/..¡¿../winnt/system32/cmd.exe
/scripts/..¡ú../winnt/system32/cmd.exe
/scripts/..¿Ø../winnt/system32/cmd.exe
Code:
RedirectMatch permanent (.*)cmd.exe$ [url]http://www.nohackerz.com/[/url]
RedirectMatch permanent (.*)root.exe$ [url]http://www.nohackerz.com/[/url]
RedirectMatch permanent /scripts(.*) [url]http://www.nohackerz.com/[/url]
What is the trick to redirect these?