Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Hacking problem on our website...neverevernosanity webworm generation 13
http:// www.paxbaculum.com | 12/20/04 | armedanddangerous

Posted on 12/20/2004 7:03:43 PM PST by Armedanddangerous

Some friends and I have operated a self defense survival and conservatism website called www.paxbaculum.com .

This afternoon someone apparently took control of it with a worm called neverevernosanity webworm generation 13.


TOPICS: Miscellaneous; Technical; Your Opinion/Questions
KEYWORDS: cyberterrorism; hackers
Navigation: use the links below to view more comments.
first 1-2021-4041-59 next last
This afternoon someone apparently took control of it with a worm called neverevernosanity webworm generation 13. Is anyone familiar with this webworm, where it came from, how the hacker might have used it or how we can get it off there?

Any way to trace it back to the person who sent the webworm? We are fairly certain we know who did it. It's just proving it..

1 posted on 12/20/2004 7:03:43 PM PST by Armedanddangerous
[ Post Reply | Private Reply | View Replies]

To: Armedanddangerous

not too much of a problem. What is the IP address that was connecting?


2 posted on 12/20/2004 7:04:55 PM PST by shellshocked
[ Post Reply | Private Reply | To 1 | View Replies]

To: shellshocked

My partner in another state has that information..and is working with the provider to get it back on line. I just wanyt to try and figure out how they got us and make sure it doesnt happen again.


3 posted on 12/20/2004 7:08:03 PM PST by Armedanddangerous (Yep, ya caught me, ya caught the tater)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Armedanddangerous

Install ZoneAlarm and it will tell you what IP the trojan is trying to contact. Of course, it may be an innocent party's PC they have installed a "zombie" on.


4 posted on 12/20/2004 7:15:30 PM PST by Abcdefg
[ Post Reply | Private Reply | To 3 | View Replies]

To: Armedanddangerous
First things first. Please answer these questions:

  1. What is the OS of your site?
  2. What services run on the system?
  3. Do you use FrontPage, PHP or similar services on your web server?
  4. How do you know your system was taken over by a worm (rather than an anklebiting scriptkiddy)?
  5. What is the OS of your workstations that you use to access your server?
  6. Do you have minimal safety measures on your workstation (personal firewall, current anti-virus programs, anti-spyware programs)?

Once we get some answers, we can start narrowing down the vector of the attack against your site.

5 posted on 12/20/2004 7:22:47 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Armedanddangerous

That worm hit other websites, too.

I was trying to access one business website and it showed that it had been attacked. The owners took the site down and they still haven't got it back up and running.


6 posted on 12/20/2004 7:22:57 PM PST by TomGuy (America: Best friend or worst enemy. Choose wisely.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Armedanddangerous

Run command netstat -an ?


7 posted on 12/20/2004 7:26:15 PM PST by RedBloodedAmerican
[ Post Reply | Private Reply | To 1 | View Replies]

To: RedBloodedAmerican
Run command netstat -an?

Results are questionable in the event of an intrusion unless one is using a statically-compiled binary on read-only media.

8 posted on 12/20/2004 7:30:52 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: TomGuy
That worm hit other websites, too.

Which sites? There have been no such reports on any computer and network security lists that I'm on.

9 posted on 12/20/2004 7:33:32 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Prime Choice

Well if they arent at the server themselves then they could probably see their site domain hosts stats to see who was there.


10 posted on 12/20/2004 7:34:17 PM PST by RedBloodedAmerican
[ Post Reply | Private Reply | To 8 | View Replies]

To: Armedanddangerous
If you have your own server, get Zone Alarm Fire Wall (with Visual Zone for non-Pro version), Linksys NAT router, Kaspersky Anti Virus, and an IDS (packet tracker).
11 posted on 12/20/2004 7:38:41 PM PST by Wiz
[ Post Reply | Private Reply | To 1 | View Replies]

To: Armedanddangerous

Reported here? http://www.us-cert.gov/current/current_activity.html


12 posted on 12/20/2004 7:40:33 PM PST by Splatter (A foolish man is able to learn, has the opportunity, and does not do it..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Armedanddangerous
For anti Spyware, get SpyBot or AdAware. Those are the best known and reliable products.
13 posted on 12/20/2004 7:42:00 PM PST by Wiz
[ Post Reply | Private Reply | To 1 | View Replies]

To: RedBloodedAmerican

Let's hope that their provider had some kind of network IDS logging in place. Considering the damage in play, I kind of doubt it, though...


14 posted on 12/20/2004 7:43:15 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Armedanddangerous

Here is a new one (2 me).. http://www.securityfocus.com/bid/11981


15 posted on 12/20/2004 7:45:09 PM PST by Splatter (A foolish man is able to learn, has the opportunity, and does not do it..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wiz
If you have your own server, get Zone Alarm Fire Wall (with Visual Zone for non-Pro version), Linksys NAT router, Kaspersky Anti Virus, and an IDS (packet tracker).

ZoneAlarm is for workstations, not servers. A NAT offers no security benefits at all. And anti-virus programs are for workstations, not servers.

16 posted on 12/20/2004 7:48:42 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Prime Choice

This is a little dated..but...
http://www.securityfocus.com/archive/1/381402


17 posted on 12/20/2004 7:49:52 PM PST by Splatter (A foolish man is able to learn, has the opportunity, and does not do it..)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Armedanddangerous

Looks like you're running RedHat Linux (Fedora) with Apache/2.0.50. Might want to reinstall the OS from scratch, apply all the latest patches, and check to make sure all of your apps are up to date before going back online.


18 posted on 12/20/2004 7:51:27 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #19 Removed by Moderator

To: Splatter

That issue was due to Debian's implementation of Apache rather than a problem with Apache itself. The server that paxbaculum.com runs on is Red Hat.


20 posted on 12/20/2004 7:53:21 PM PST by Prime Choice (Merry Christmas and a Happy New Year! ...And no, my powers can only be used for Good.)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-59 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson