0

I received a report today that a server I manage (Centos + Apache) is launching a bruteforce attack against wordpress websites:

hacked-joomla/brobot

The requests sent look like this:

x.x.x.x - - [15/Nov/2015:19:37:14 +0100] "POST wp-login.php HTTP/1.1" 200 3963 "referer-domain.tld" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0"

I tried to locate the source of the attack using tcpdump, lsof and netstat, but I was unable to locate any useful information.

I need to be able to monitor the outgoing web traffic and see not only the destination, but also the source - the file/vhost that the request was sent from.

Any suggestions or guidelines are more than welcome!

P.S. David W. thank you for the link, but it is a very general guide on compromised servers. I have a very specific problem - I need an efficient tool/method to monitor my traffic to identify the source of an outbound attack. I am not experienced in networking etc. and have not used netstat, tcpdump and lsof much, but I am looking for a similar tool or a combination of tools that can be provide me with the traffic data that I need.

Falcon Momot
  • 25,584

0 Answers0