Server IP : 195.201.23.43 / Your IP : 13.59.16.6 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /home/kdecoratie/cgi-bin/lib/ |
Upload File : |
# AWSTATS WORMS ADATABASE #----------------------------------------------------------------------------- # If you want to add worms to extend AWStats database detection capabilities, # you must add an entry in WormsSearchIDOrder, WormsHashID and WormsHashLib. #----------------------------------------------------------------------------- #package AWSWORMS; # WormsSearchIDOrder # This list is used to know in which order to search Worm IDs. # This array is array of Worms matching criteria found in URL submitted # to web server. This is a not case sensitive ID. #----------------------------------------------------------------------------- @WormsSearchIDOrder = ( '\/default\.ida', '\/null\.idq', 'exe\?\/c\+dir', 'root\.exe', 'admin\.dll', '\/nsiislog\.dll', '\/sumthin', '\/winnt\/system32\/cmd\.exe', '\/_vti_inf\.html', '\/_vti_bin\/shtml\.exe\/_vti_rpc' ); # WormsHashID # Each Worms search ID is associated to a string that is unique name of worm. #----------------------------------------------------------------------------- %WormsHashID = ( '\/default\.ida','code_red', '\/null\.idq','code_red', 'exe\?\/c\+dir','nimda', 'root\.exe','nimda', 'admin\.dll','nimda', '\/nsiislog\.dll','mpex', '\/sumthin','sumthin', '\/winnt\/system32\/cmd\.exe','nimda', '\/_vti_inf\.html','unknown', '\/_vti_bin\/shtml\.exe\/_vti_rpc','unknown' #'/MSOffice/cltreq.asp' # Not a worm, a check by IE to see if discussion bar is turned on #'/_vti_bin/owssrv.dll' # Not a worm, a check by IE to see if discussion bar is turned on ); # WormsHashLib # Worms name list ('worm unique id in lower case','worm clear text') # Each unique ID string is associated to a label #----------------------------------------------------------------------------- %WormsHashLib = ( 'code_red','Code Red family worm', 'mpex','IIS Exploit worm', 'nimda','Nimda family worm', 'sumthin','Sumthin worm', 'unknown','Unknown worm' ); # WormsHashTarget # Worms target list ('worm unique id in lower case','worm target clear text') # Each unique ID string is associated to a target #----------------------------------------------------------------------------- %WormsHashTarget = ( 'code_red','IIS', 'mpex','IIS', 'nimda','IIS', 'sumthin','?', 'unknown','MS products', ); 1;Private