[Snort-users] WEB-IIS cmd.exe access

Laverdière Yvan y.laverdiere at ...7091...
Mon Oct 7 07:43:08 EDT 2002

You should pay attention to the HTTP return codes found in your web server
logs. This code should give you a good hint regarding the success (or not)
of the attack.


For example, a return code of 200 would be a good reason to grab a gun and
start hunting... :)

Hope this helps,


-----Original Message-----
From: Alwin Raymundo [mailto:alrayworld at ...131...] 
Sent: Monday, October 07, 2002 8:57 AM
To: user snort
Subject: [Snort-users] WEB-IIS cmd.exe access

Hi Everybody,

This morning when I review some of the attacked on our
ISS server, I found this

HEAD /c/winnt/system32/cmd.exe?/c+dir+c:\ HTTP/1.0\r\n
Host: xxx.xxx.xx.297\

and so many more.

My question is does my ISS server has been exploited?
because most of the time.  I always see "Connection
Closed" so I dont bother but this time I'm little bit

I check also the log files on the ISS server but the
IP address of the attacker was not there.

All service pack has been installed on this machine I
I think).  I just want to be sure if my machine is not

anyone can shed light on this matter would be highly

Thanks in Advance.

Alwin Raymundo

Do you Yahoo!?
New DSL Internet Access from SBC & Yahoo!

This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
Snort-users mailing list
Snort-users at lists.sourceforge.net
Go to this URL to change user options or unsubscribe:
Snort-users list archive:
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-users/attachments/20021007/e16933de/attachment.html>

More information about the Snort-users mailing list