• Resolved Robert Eichhorn

    (@robert-eichhorn)


    I am checking my website access logs to try to identify hackers. I would like to know if you think the following examples of file series hits are hacker hits.

    File Series 1:
    1. /admin/fckeditor/editor/filemanager/browser/default/connectors/test.html
    2. /admin/fckeditor/editor/filemanager/connectors/test.html
    3. /admin/fckeditor/editor/filemanager/uploads/test.html
    4. /fckeditor/_samples/asp/sample01.asp

    File Series 2:
    Note: The request is HEAD. My web host says for a HEAD request the server replies with a response line and headers, but no entity-body.
    1. /wp-content/themes/clockstone/theme/functions/upload.php
    2. /wp-content/themes/ColdFusion/includes/uploadify/upload_settings_image.php
    3. /wp-content/themes/elemin/themify/themify-ajax.php
    4. /wp-content/themes/OptimizePress/lib/admin/media-upload.php

    File Series 3:
    1. GET /06,+++Result:+not+found;+no+post+sending+forms+are+found;

Viewing 11 replies - 1 through 11 (of 11 total)
  • Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    Series 1 could be a bot looking for exploits, especially since those files don’t exist in WordPress.

    Series 2 could be the same, is the IP accessing them either your server’s IP or your IP?

    Series 3 is odd, I’d suspect at the very lest a poorly coded bot of some sort, could be search indexer, comment spam, or sniffing for exploits.

    Thread Starter Robert Eichhorn

    (@robert-eichhorn)

    @macmanx (James Huff).

    1. File Series 1. The IP address is from Fuzhou, China. The User-Agent is not identified as a Bot.
    2. File Series 2. The IP address is from Poland. So, IP address is not my web host’s server or my IP address. No User-Agent was identified.
    3. File Series 3. The IP address is from Nanning, China. The User-Agent is not identified as a Bot.

    Concerning File Series 2. It appears that someone is trying to upload themes to my site and it is not me or my website designer.

    Also, do you know of any resources to help identify files on a WP site that are being hit by a hacker?

    Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    It appears that someone is trying to upload themes to my site and it is not me or my website designer.

    How do you feel that is the case? Most bots of this nature are just looking for exploitable files, which appears to be the case here. They basically have a big list of exploitable files and look for them wherever they go. No precision, just a bulk request, and they can’t upload files via HTTP anyway.

    Also, do you know of any resources to help identify files on a WP site that are being hit by a hacker?

    To be honest, it’s a pretty pointless exercise. There are so many exploit sniffing bots out there, they you’ll probably see a few thousand suspicious things in your logs daily.

    Instead, keep most of the bad bots out via .htaccess with things like http://perishablepress.com/5g-blacklist-2013/ and http://perishablepress.com/2014-micro-blacklist/

    Beyond .htaccess, you can apply some decent mod_security rules or ask your hosting provider to (I really don’t have any recommended links for that at the moment).

    There are also plugins out there like http://wordpress.org/plugins/better-wp-security/ and http://wordpress.org/plugins/better-wp-security/ for tons of security features, as well as http://wordpress.org/plugins/sucuri-scanner/ if you just want to keep track of modified files and watch for common hacks.

    Most importantly, keep good passwords on everything, and keep regular backups: http://codex.wordpress.org/WordPress_Backups

    And of course, you may to implement some (if not all) of the recommended security measures: http://codex.wordpress.org/Hardening_WordPress

    File Series 1: I’ve had a ton of these in my logs the past couple of days. Just scripts looking for known exploits.

    File Series 2: I see these quite often. I tend to dismiss these as probably being generated by the WPScan script scanning through a list of known themes and plugins with potential vulnerabilities. Just pay attention to any of the theme and plugin probes that might actually return a 200. Make sure you’re not using a vulnerable version.

    Thread Starter Robert Eichhorn

    (@robert-eichhorn)

    @macmanx (James Huff).

    This file from File Series 2 looks like it is trying to upload a theme. Now that you mention files can’t be uploaded via HTTP I realize the request must be for a file. I am not familiar with the process of uploading themes.
    1. /wp-content/themes/clockstone/theme/functions/upload.php

    Thanks for the information concerning resources to check out WP files that are being hacked. I realize Bots may have 90,000 IP addresses to hack from but I decided to check my access logs anyway to check for hackers.

    Thread Starter Robert Eichhorn

    (@robert-eichhorn)

    @claytonjames.

    Question 1: What is a WPScan script and is it a valid request or a hacker request?

    Question 2: You say pay attention to theme and plugin probes that might actually return a 200. What do you mean by ‘return a 200’? I am not familiar with the term 200 in this context.

    Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    Now that you mention files can’t be uploaded via HTTP I realize the request must be for a file. I am not familiar with the process of uploading themes.

    Yeah, it’s definitely just looking for the file. That Upload script is probably used by something else in the theme to upload a logo or something (which any good theme developer would just use WordPress’s built-in functions for, and this is why), so it looks like Series 2 is just looking for exploitable files.

    What is a WPScan script and is it a valid request or a hacker request?

    I won’t link to it, but you can find it via Google. Per their description, it’s “a black box WordPress vulnerability scanner.”

    In other words, they say it’s design to help you find vulnerabilities in your own site, but it can be easily set up as a bot to search the web for vulnerabilities and report back, which is probably what it’s used most for these days.

    You say pay attention to theme and plugin probes that might actually return a 200. What do you mean by ‘return a 200’?

    HTTP status 200 means that the probed file exists. So, if you see a logged probe hit to a file which reports 404, you have nothing to worry about because that file doesn’t even exist on your site. Likewise, if you see 403, you also have nothing to worry about because that means the file was found, but your server denied access to it.

    If a vulnerability scanner is looking for exploitable files, and logs a 200 request, that means it found the file (and therefore the vulnerability) on your server.

    Which basically brings me back to the fact that combing your logs for these things is a full-time job (not just part of a larger full-time job). Stick to good security practices with .htaccess and mod_security rules, and maybe a security plugin, and you shouldn’t have anything to worry about, plus most of these things will never even make it to your logs.

    Then, you can just focus on blogging. 🙂

    Thread Starter Robert Eichhorn

    (@robert-eichhorn)

    @macmanx (James Huff). I checked Google for WPScan and found the developer’s site. I was wondering why WPScan was being used to scan my site. No reason for it. Thanks for informing me about WPScan being used as a Bot. Now it makes sense. Someone is using WPScan to probe my site to find vulnerabilities. A tool that can be used for good and evil.

    Also, thanks for the information concerning ‘return a 200’. My web host gave me the Apache log format but ‘return a 200’ didn’t make sense to me.

    Concerning checking access logs for hacker IP addresses to block. I did find IPs making excessive number of hits on PDF files. Useful information.

    Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    Excellent, run those IPs through a WHOIS search to make sure they aren’t from Google, Bing, etc, before blocking them.

    Thread Starter Robert Eichhorn

    (@robert-eichhorn)

    @macmanx (James Huff). Good idea to make a WHOIS check on the IPs. Thanks. I found a website to check the location of IP addresses. The URL is:
    http://www.iplocation.net/

    A useful tool you can add to your toolbox.
    Thanks again for your help.

    Moderator James Huff

    (@macmanx)

    Volunteer Moderator

    It’s a fun tool, but it location won’t help much in the sense of identifying a bad IP vs. a good IP. Google has servers in every country that they can legally host them in, and the Googlebot can come from any one of them, the same is true for Bing and others.

Viewing 11 replies - 1 through 11 (of 11 total)
  • The topic ‘Hacked Files?’ is closed to new replies.