Forum Moderators: phranque

Message Too Old, No Replies

Hijacking?

Not sure about a url showing up in my stats

         

2tails

4:12 pm on Oct 8, 2006 (gmt 0)

10+ Year Member



I had this url (http://www.example.com/backgrounds/photobucket.com) show up in my stats. Trouble is, I don't have anything to do with photobucket (never have) and I certainly do not have an extension with the name photobucket in it. This was described as an exit page in my stats but when I click on it, it takes me to my main page.

Anybody know what's up with that? Or how that could have happened?

Thanks in advance
Audrey

[edited by: tedster at 5:57 pm (utc) on Oct. 8, 2006]
[edit reason] use example.com - not your real domain [/edit]

2tails

5:21 pm on Oct 8, 2006 (gmt 0)

10+ Year Member



? Can anyone help?

jtara

5:32 pm on Oct 8, 2006 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I'm assuming this is a variation on "referal spam". I've seen it as well, and it doesn't make a whole lot of sense. You can certainly filter it out with some mod_rewrite rules.

"Referral spam" is when you are given a request with an incorrect "referrer" header. The intent to to make it appear that you are getting traffic referred to you from sites that you actually aren't.

The hope on the part of the spammer is that you publish some sort of list of "top sites that refer to us" or else have an open log page. Because some blogging software automatically generates the "top sites" sort of list, this has become more popular.

This is a bit different, though. Somebody has accessed your site with the host: header set to an irrelevant site. The host: header, which was not supported prior to HTTP 1.1, is used to distinguish between sites when accessing a virtual host. Let's say you have example.com and example2.com, and you want to run both using the same server and IP address. How can the server tell the difference? It can tell by looking at the host: header, which all modern browsers add to the request.

There is nothing that will prevent client software from putting any arbitrary string in this header, though.

I suppose the hope is that you publish a list of "most accessed pages" or else have an open log published on your site. You can see that if somebody hit you enough times and you published such a list, somebody else's site could wind-up at the top of your list.

It could also be an attempt to find open proxy servers? Frankly, I'm not familiar with the details of how proxy servers work, or if they typically would be on port 80 at all.

They are already getting a 404 error. But you could take some more agressive steps. The ultimate way to reject this would be with an application-level firewall that would disconnect upon seeing a host: header that doesn't correspond to a site that is hosted on your server.

2tails

5:46 pm on Oct 8, 2006 (gmt 0)

10+ Year Member



Thank you for your reply and I will take all your observations into consideration. The first thing I will do is reconnect my firewall. I had it down the other day since it was interfering with something I was attempting to do. I forgot to put it back on.

So far, this is the only instance where I've noticed this particular url with that extension on it. I hope I do not see another.

Thanks again for your help,
Audrey

jtara

3:51 am on Oct 9, 2006 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Whoops! I got the details wrong, sorry.

It's not the host header but the request header. (Though I have seen invalid host headers, as well.)

Same idea, though. There's nothing to stop a client from stuffing any arbitrary text - whether meaningful or not - into any header. In this case, it's the request header.

Many hardware firewalls do have the ability to screen this out. For example, on a Netscreen firewall, you can use the Screening, Mal-URL setup to block any HTTP request that starts with "http://".

I see quite a bit of this in my logs. I assume they are looking for open proxy servers, I don't run a proxy server, and so it's benign, save for the unwanted traffic.