Return-Path: Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 12881 invoked by uid 500); 24 Jul 2003 17:07:29 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 12858 invoked from network); 24 Jul 2003 17:07:29 -0000 Received: from email.starprecision.com (65.116.245.2) by daedalus.apache.org with SMTP; 24 Jul 2003 17:07:29 -0000 Received: from JWHITLOCK [65.116.245.3] by email.starprecision.com with ESMTP (SMTPD32-7.07) id A153120B0154; Thu, 24 Jul 2003 11:03:15 -0600 From: "Jeremy Whitlock" To: Date: Thu, 24 Jul 2003 11:03:15 -0600 Organization: Star Precision, Inc. Message-ID: <007901c35205$793dc030$e0c7c7c7@starprecision.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.2627 Importance: Normal In-Reply-To: X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165 X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N Subject: RE: [users@httpd] Server Access Log Understanding Joshua, Thanks again. What I meant by leeching is that people scan websites for files in the same directory as the website and download them. If I had a website: http://www.mysite.com and I had a file called "Jeremy.zip" in the same directory as the website files for the site, they can download them by using some software/method to see what's in the directory. Does that make sense? Thanks, Jeremy -----Original Message----- From: Joshua Slive [mailto:joshua@slive.ca] Sent: Thursday, July 24, 2003 10:59 AM To: users@httpd.apache.org Subject: RE: [users@httpd] Server Access Log Understanding On Thu, 24 Jul 2003, Jeremy Whitlock wrote: > Joshua, > I haven't done anything like that. I just hate to see that > people are even trying I guess. I also see that people are "leeching" > my files that I've put in one of the folders. Is there anyway to stop > leeching? Thanks, Jeremy If it gives you any consolation, you are not alone. This is not some individual hacker picking on you, this is either: 1. A worm that is spreading on its own. 2. A hacker that is scanning huge portions of the internet for any vulnerable server. In general, these worms and hackers are targetting IIS, so there is very little chance of an apache server being affected. As far as "leeching", you need to define what you mean. If you mean that people are inlining your images into their own pages, you should look at "Prevent image theft" under: http://httpd.apache.org/docs-2.0/env.html#examples > P.S. - How can I tell if someone were successful at trying to hack my > machine? Is there any status code or such I can look for? Well, a status code starting in 2 means that the request was successful. But a successful request does not mean a successful hack (and the contrary applies as well, actually). I don't think there is any magic formula for figuring out if you've been hacked. That's why people make big bucks selling crappy intrusion detection software. One thing you can try is to extract a part of the request and type it into google to see what people are saying about it. Usually you can find out what exploit is being used, and make sure you are not vulnerable to that exploit. Joshua. --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org