From: eldy <> Date: Sat, 10 Jan 2004 11:17:00 +0000 (+0000) Subject: Updated documentation. X-Git-Tag: AWSTATS_6_0_RELEASE~13 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=19b3645d00bbe51cd30d25cfc2ba4e098ae496e8;p=thirdparty%2FAWStats.git Updated documentation. --- diff --git a/docs/awstats_faq.html b/docs/awstats_faq.html index bcd79747..c08ecf38 100644 --- a/docs/awstats_faq.html +++ b/docs/awstats_faq.html @@ -1387,9 +1387,15 @@ unknown URL like this one:
/default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%40%50...%40%50
URL is generated by the infected robot and the purpose is to exploit a vulnerability of the web server (In most cases, only IIS is vulnerable). With such attacks, you will will always find a 'common string' in those URLs. -For example, with Code Red worm, there is always default.ida in the URL string. Some other worms send URLs with cmd.exe in it. -So, you should edit your config file to add in the SkipFiles parameter the following value:
-SkipFiles="default.ida cmd.exe"
+For example, with Code Red worm, there is always default.ida in the URL string. Some other worms send URLs with cmd.exe in it.
+With 6.0 version and higher, you can set the LevelForFormDetection +parameter to "2" and ShowWormsStats to "HBL" in +config file to enable the worm filtering nd reporting.
+However, this feature reduce seriously AWStats speed and the worms database (lib/worms.pm file) can't contain +all worms signatures. So if you still have rubish hits, you can modify the worms.pm file yourself or +edit your config file to add in the SkipFiles parameter some +values to discard the not required records, using a regex syntax like example :
+SkipFiles="REGEX[^\/default\.ida] REGEX[\/winnt\/system32\/cmd\.exe]"