Go Back   vb.org Archive > Community Discussions > Forum and Server Management
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 09-27-2009, 10:44 PM
LoverZPoint LoverZPoint is offline
 
Join Date: Feb 2009
Posts: 9
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default DOS! Attack on vBulletin

Hello,

well my vbulletin is Under attack i have Contact With my Dedicated hosting provider and i tried DDOS protecting sheild's ETC! everything my dedicated server provider says they can't protect from internel Server attacks Like this its attacking from script to mysql

then some one told me to use litespeed webserver !

i got some screen shots here!


< my site was enabled as you can see in screen shot more then 600 requets in Processing ... those request creating load and attacking to mysql and as you can see its 92% Load on webserver.

on 2nd screen shot i have disabled site i mean forum..





all request going fine to server over 4,000 per/second to 10,000 requests and 0.50 Load...

So what should i do now to stop this f**king Attack!!!
Reply With Quote
  #2  
Old 09-27-2009, 10:49 PM
Lynne's Avatar
Lynne Lynne is offline
 
Join Date: Sep 2004
Location: California/Idaho
Posts: 41,180
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Take a look at your access_logs and see which script they were accessing. Maybe it was a modification and all you have to do is turn it off.
Reply With Quote
  #3  
Old 09-27-2009, 11:29 PM
snakes1100 snakes1100 is offline
 
Join Date: Dec 2001
Location: Michigan
Posts: 3,733
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

ssh into server, paste in below command and hit return on the kb.

iptables -I INPUT -p tcp -s pakbugs.com -j DROP

If it gives you cmd not found, locate iptables, sometimes if your profile isnt right.

/sbin/iptables -I INPUT -p tcp -s pakbugs.com -j DROP

nano /etc/rc.local and place the above cmd into the file before the "exit 0" and save the file, will be called on any reboot to always block that hostname, regardless of ip.
Reply With Quote
  #4  
Old 09-27-2009, 11:53 PM
LoverZPoint LoverZPoint is offline
 
Join Date: Feb 2009
Posts: 9
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Quote:
Originally Posted by Lynne View Post
Take a look at your access_logs and see which script they were accessing. Maybe it was a modification and all you have to do is turn it off.
Hello,

i have tried Everything ! Disable all plugins etc.. i also tried nginx Web server, Lighttpd, IIS, and now Litespeed ..

well all users access to index.php .... !
i was using before 3.7.2 i upgraded to 3.8.4 BUt no Luck!
Reply With Quote
  #5  
Old 09-28-2009, 02:15 AM
CarlitoBrigante's Avatar
CarlitoBrigante CarlitoBrigante is offline
 
Join Date: Nov 2002
Location: Iceland
Posts: 182
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

You would need a very fast admin working throughout the time of the attack on your server to effectively limit the effects of the attack on the machine.

Mod evasive might also help, and even some software firewalls like APF have some auto-detection mechanism that can stop a small percentage of the attacks. Both are very easy to install, and free - but again, if the attacker knows what he is doing, they won't help much.

http://www.zdziarski.com/projects/mod_evasive/ (recommend reading: http://www.eth0.us/mod_evasive)
http://www.rfxn.com/?page_id=44

Mod Evasive can theoretically be left always on in your server, even after the attack, even though it must be carefully configured or it will stop legitimate connections and thus cut your traffic and annoy your users.
Reply With Quote
  #6  
Old 10-01-2009, 10:38 PM
Hell Bomb Hell Bomb is offline
 
Join Date: Jun 2009
Posts: 385
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

i would suggest installing view guests ip addresses and blocking individual ip addresses that are sending more then 100 requests a second.
Reply With Quote
  #7  
Old 10-02-2009, 04:40 AM
toonysnn toonysnn is offline
 
Join Date: Sep 2006
Location: Texas
Posts: 511
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Quote:
Originally Posted by snakes1100 View Post
ssh into server, paste in below command and hit return on the kb.

iptables -I INPUT -p tcp -s pakbugs.com -j DROP

If it gives you cmd not found, locate iptables, sometimes if your profile isnt right.

/sbin/iptables -I INPUT -p tcp -s pakbugs.com -j DROP


nano /etc/rc.local and place the above cmd into the file before the "exit 0" and save the file, will be called on any reboot to always block that hostname, regardless of ip.
If you have not already done so, I would suggest this. But, I'm assuming that the attack is over.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 08:57 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03820 seconds
  • Memory Usage 2,221KB
  • Queries Executed 13 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (2)bbcode_quote
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (7)post_thanks_box
  • (7)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (7)post_thanks_postbit_info
  • (7)postbit
  • (7)postbit_onlinestatus
  • (7)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_postinfo_query
  • fetch_postinfo
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete