Re: shellshock probing

2015-04-02 Thread B.R.
That is the power of the 'empty value = does nothing' logic. :o) --- *B. R.* On Thu, Apr 2, 2015 at 3:33 PM, Cole Tierney wrote: > > On Apr 2, 2015, at 7:21 AM, itpp2012 wrote: > > > > Cole Tierney Wrote: > > --- > >> Or is there a better meth

Re: shellshock probing

2015-04-02 Thread Cole Tierney
> On Apr 2, 2015, at 7:21 AM, itpp2012 wrote: > > Cole Tierney Wrote: > --- >> Or is there a better method to block these? > > Not really better but good enough :) > > map $http_referer $waffableref { >default

Re: shellshock probing

2015-04-02 Thread itpp2012
Cole Tierney Wrote: --- > Or is there a better method to block these? Not really better but good enough :) map $http_referer $waffableref { default 0; ~*\{.*\:\; 1; } map $http

Re: shellshock probing

2015-04-01 Thread mex
if you have questions on naxsi, feel free to join the naxsi-discuss - ml https://groups.google.com/forum/#!forum/naxsi-discuss cheers, mex Posted at Nginx Forum: http://forum.nginx.org/read.php?2,257792,257801#msg-257801 ___ nginx mailing list ng

Re: shellshock probing

2015-04-01 Thread Cole Tierney
Thanks mex, I’ll check it out. > On Apr 1, 2015, at 4:50 PM, mex wrote: > > hi cole, > > if implemetable you couldd use naxsi https://github.com/nbs-system/naxsi > for this, there exists a rule to detect and block > shellshock-exploit-attempts: > > MainRule "str:() {" "msg:Possible Remote cod

Re: shellshock probing

2015-04-01 Thread mex
hi cole, if implemetable you couldd use naxsi https://github.com/nbs-system/naxsi for this, there exists a rule to detect and block shellshock-exploit-attempts: MainRule "str:() {" "msg:Possible Remote code execution through Bash CVE-2014-6271" "mz:BODY|HEADERS" "s:$ATTACK:8" id:42000393 ; see

shellshock probing

2015-04-01 Thread Cole Tierney
Hello, I'm seeing lots of shellshock probing in my access logs. My server's not vulnerable, but my logs are filling up with 404s. The requests are for random cgi scripts. The referer and user_agents are the same and always start with () { :; }; followed by curl or wget to a remote p