Questions tagged [attacks]
100 questions
0
votes
1 answer
Login failed for user 'sa'. ...... [CLIENT: 59.48.47.215]
I have an Amazon EC2 instance and i don't have anything running on it yet but my event log is full of below error
"Login failed for user 'sa'. Reason: An attempt to login using SQL authentication failed. Server is configured for Windows…

Parham
- 101
0
votes
1 answer
Are empty HTTP requests malicious?
I have seen multiple empty http request log entries from Apache:
HOST:443 REMOTEIP - - [DATA AND TIME] "-" SIZE SIZE "-" "-"
Are these malicious attacks, or some misconfiguration on my side?
0
votes
1 answer
Tracking anonymous e-mail threat
A user spoofed/sent an email from http://emkei.cz/ with a very serious threat. Is it possible to trace this back or are we SOL?
There wasn't much in the email headers other than that it came from that site. We've checked DNS records for the site's…

LaidBach
- 11
- 1
0
votes
3 answers
POP / IMAP server under attack : what risks and how to secure?
Since yesterday (7am), our POP server is under a dictionnary attack : this is what I found in /var/log/mail.log :
Mar 26 10:31:36 serv pop3d: LOGIN FAILED, user=monday, ip=[::ffff:91.121.**.***]
Mar 26 10:31:41 serv pop3d: Disconnected,…

Hugo H
- 119
- 1
- 7
0
votes
1 answer
How protect from DDOS attack?
I have many requests with refferer like alexa.com google.com and etc. to main and couple another pages of site. Line from access.log
109.172.15.39 - - [11/Jan/2013:02:30:30 +0400] "GET /topic?criteria=%&x=0&y=0&pageNo=34 HTTP/1.1" 403 571…

Dmitro
- 159
- 1
- 5
- 12
0
votes
1 answer
Netscan detected from host
Possible Duplicate:
My server’s been hacked EMERGENCY
Portscan attacks from somewhere
I am using Hetzner's dedicated servers. Today I have got a message:
We have received information that there was an attack from your server.
----- attachment…

Etam
- 171
- 1
- 1
- 5
0
votes
3 answers
avoid people running "stress tests" / attacks on our server (CentOS + Apache)
today we ran apachebench on our server to stress test it. Of course, our system peaked and disk I/O was massive. Can we avoid that other people run such "tests" or some sort of attack to stress our system?
We are running apache on centos, iptables…

solsol
- 1,121
- 8
- 21
- 31
0
votes
1 answer
Any way to stop people from img "framing" your site?
Someone was trying to get cute with me, by "iframeing" my search result page via an IMG tag with 0 width and 0 height, in hopes of killing my server resources. My searches are cached, so it doesn't do much damage, since its just a static file being…
user11350
0
votes
1 answer
How Do I Secure WordPress Blogs Against Elemento_pcx Exploit?
I have a client who has several WordPress 2.9.2 blogs that he hosts. They are getting a deface kind of hack with the Elemento_pcx exploit somehow. It drops these files in the root folder of the blog:
-rw-r--r-- 1 userx userx 1459 Apr 16 04:25…

ServerChecker
- 1,518
- 2
- 14
- 35
0
votes
0 answers
avoid leaking info whether the user is denied access or typed the incorrect password
I am currently tinkering with the sshd_config and /etc/security/access.d for a large system with 10k+ users. There are so many different ways of restricting user access and it makes my head spin a bit trying to find "the best way". In short
We can…

N3buchadnezzar
- 101
0
votes
0 answers
Detect website attack by using azure sentinel serviceazure
I have a website which builds on AKS. I'm getting DDoS and other kind of attacks in website. In order to take prevention against such attacks, I'm planning to use the tool Azure Sentinel…
0
votes
0 answers
Limiting the number of url address characters on the site and blocking it
hackers are slowing down my server
They send repeated requests with different IPs
They are constantly sending long url addresses like below:
mysite.com/asm-nfm555sd5-nfm.mp3asm-dnfm555sd5-nfm.mp3asdnfm555sd5-nfm.mp3asm-dnfm555sd5-nfm.mp3 ...
Can I…

sanja
- 1
- 1
0
votes
0 answers
Data reconciliation for applications
I need to create a plan for a catastrophic data loss scenario where I need to recover some services (multiple apps each) from bare metal using data backups.
The process (i believe) requires the following:
Recover binaries and data from the backup.…

ANURAG MATHUR
- 11
- 1
0
votes
1 answer
Block IPs without receiving traffic
I'm hosting on OVH Game dedicated server, the bandwitdth of this server is 1gbp/s, I'm receinving attack from other OVH Servers and they are saturating the bandwidth with 1gbp/s.
OVH doesn't filter these attacks coming from other OVH Servers.…

Jais Diaz
- 1
- 1
0
votes
1 answer
Monitor outgoing specific traffic
I have kinda of an idea but I want to consult. I was following this guide for finding out which php processes spawn outgoing brute force attacks. I found the culprits everything is working fine.
Now, how could I make an automatic system for all of…

whitenoise40
- 1
- 2