|
Reader's Favorites
Media Casualties Mount Administration Split On Europe Invasion Administration In Crisis Over Burgeoning Quagmire Congress Concerned About Diversion From War On Japan Pot, Kettle On Line Two... Allies Seize Paris The Natural Gore Book Sales Tank, Supporters Claim Unfair Tactics Satan Files Lack Of Defamation Suit Why This Blog Bores People With Space Stuff A New Beginning My Hit Parade
Instapundit (Glenn Reynolds) Tim Blair James Lileks Bleats Virginia Postrel Kausfiles Winds Of Change (Joe Katzman) Little Green Footballs (Charles Johnson) Samizdata Eject Eject Eject (Bill Whittle) Space Alan Boyle (MSNBC) Space Politics (Jeff Foust) Space Transport News (Clark Lindsey) NASA Watch NASA Space Flight Hobby Space A Voyage To Arcturus (Jay Manifold) Dispatches From The Final Frontier (Michael Belfiore) Personal Spaceflight (Jeff Foust) Mars Blog The Flame Trench (Florida Today) Space Cynic Rocket Forge (Michael Mealing) COTS Watch (Michael Mealing) Curmudgeon's Corner (Mark Whittington) Selenian Boondocks Tales of the Heliosphere Out Of The Cradle Space For Commerce (Brian Dunbar) True Anomaly Kevin Parkin The Speculist (Phil Bowermaster) Spacecraft (Chris Hall) Space Pragmatism (Dan Schrimpsher) Eternal Golden Braid (Fred Kiesche) Carried Away (Dan Schmelzer) Laughing Wolf (C. Blake Powers) Chair Force Engineer (Air Force Procurement) Spacearium Saturn Follies JesusPhreaks (Scott Bell) Science
Nanobot (Howard Lovy) Lagniappe (Derek Lowe) Geek Press (Paul Hsieh) Gene Expression Carl Zimmer Redwood Dragon (Dave Trowbridge) Charles Murtaugh Turned Up To Eleven (Paul Orwin) Cowlix (Wes Cowley) Quark Soup (Dave Appell) Economics/Finance
Assymetrical Information (Jane Galt and Mindles H. Dreck) Marginal Revolution (Tyler Cowen et al) Man Without Qualities (Robert Musil) Knowledge Problem (Lynne Kiesling) Journoblogs The Ombudsgod Cut On The Bias (Susanna Cornett) Joanne Jacobs The Funny Pages
Cox & Forkum Day By Day Iowahawk Happy Fun Pundit Jim Treacher IMAO The Onion Amish Tech Support (Lawrence Simon) Scrapple Face (Scott Ott) Regular Reading
Quasipundit (Adragna & Vehrs) England's Sword (Iain Murray) Daily Pundit (Bill Quick) Pejman Pundit Daimnation! (Damian Penny) Aspara Girl Flit Z+ Blog (Andrew Zolli) Matt Welch Ken Layne The Kolkata Libertarian Midwest Conservative Journal Protein Wisdom (Jeff Goldstein et al) Dean's World (Dean Esmay) Yippee-Ki-Yay (Kevin McGehee) Vodka Pundit Richard Bennett Spleenville (Andrea Harris) Random Jottings (John Weidner) Natalie Solent On the Third Hand (Kathy Kinsley, Bellicose Woman) Patrick Ruffini Inappropriate Response (Moira Breen) Jerry Pournelle Other Worthy Weblogs
Ain't No Bad Dude (Brian Linse) Airstrip One A libertarian reads the papers Andrew Olmsted Anna Franco Review Ben Kepple's Daily Rant Bjorn Staerk Bitter Girl Catallaxy Files Dawson.com Dodgeblog Dropscan (Shiloh Bucher) End the War on Freedom Fevered Rants Fredrik Norman Heretical Ideas Ideas etc Insolvent Republic of Blogistan James Reuben Haney Libertarian Rant Matthew Edgar Mind over what matters Muslimpundit Page Fault Interrupt Photodude Privacy Digest Quare Rantburg Recovering Liberal Sand In The Gears(Anthony Woodlief) Sgt. Stryker The Blogs of War The Fly Bottle The Illuminated Donkey Unqualified Offerings What she really thinks Where HipHop & Libertarianism Meet Zem : blog Space Policy Links
Space Future The Space Review The Space Show Space Frontier Foundation Space Policy Digest BBS AWOL
USS Clueless (Steven Den Beste) Media Minder Unremitting Verse (Will Warren) World View (Brink Lindsay) The Last Page More Than Zero (Andrew Hofer) Pathetic Earthlings (Andrew Lloyd) Spaceship Summer (Derek Lyons) The New Space Age (Rob Wilson) Rocketman (Mark Oakley) Mazoo Site designed by Powered by Movable Type |
How Do They Do It? I'm running a few private blogs, for business purposes, that are password protected via .htaccess on the main and archive directories. There are no external links to them from the open net, and they haven't been archived by Google. Yet somehow the spammers have found them. A couple days ago, we had dozens of poker spams in the comments. Anyone have any idea how they're doing this? Posted by Rand Simberg at February 20, 2005 08:11 AMTrackBack URL for this entry:
http://www.transterrestrial.com/mt-diagnostics.cgi/3439 Listed below are links to weblogs that reference this post from Transterrestrial Musings.
Comments
You may have a trojan on your PC. Somebody may have harvested your usernames and passwords. Posted by Mike Puckett at February 20, 2005 11:15 AMThat's pretty unlikely--I'm behind a vicious firewall, and running Zone Alarm as well. Though perhaps they got them from one of the other users. Posted by Rand Simberg at February 20, 2005 12:00 PMSpammers aren't known for playing by the rules, I wouldn't be surprised that a bot for spammers can pull such things, even from a password protected page. Posted by B.Brewer at February 20, 2005 01:53 PMMy point is, how do they even know that the pages are there to break into, unless they've hacked the site? And if they can do that, there are a lot worse things they could be doing than comment spamming. Posted by Rand Simberg at February 20, 2005 02:10 PMRand What makes you think your spammers would be interested in anything worse than comment spamming? I don't really know very much about tracking stuff on the internet, but could it be that they found your website via one (or more) of the sites it's linking to? Maybe the 'bot has a cracked list of the websites referring people to www.cnn.com or something. If this is how they're finding you, it may be worth your time to write implement a script that reroutes all hyperlinks through another webpage, either one you control or a free service like www.tinyurl.com. run a spyware check--most spyware doesn't seem to even get slowed down by most conventional firewalls et al, so you may have some despite the firewall. Another alternative is that the spyware has infected somebody who uses or has used your site. THat being said, perhaps the biggest probability is that the spammers are just hitting every URL in existance, just to see what they get. Make sure that you have trackbacks/pingbacks disabled, and that you have turned off all notification services. Lots of blogs get found by the spammers this way. You make a post, and it ends up on the notification sites (blo.gs, Technorati, etc.), and it's all downhill from there. Pingomatic, while useful if you want to be found, is especially bad if you're trying to hide since it hits about 15 of those services. Posted by Patrick O'Leary at February 20, 2005 07:05 PMAre your comment-posting cgi's themselves accessable without a password? And do they have the default names for the script? Spammers will often do a 'brute-force' search by simply attempting to post to http://domain-name/comment-script.cgi for every domain name and common comment script name they can find. I've seen these hits on my sites, and I don't even have blogging software installed. If you can, password protect the comments scripts. If you can't do that, rename them to something nonstandard. Posted by Monsyne Dragon at February 21, 2005 12:25 AMIf these blogs have unique domain names, they can be found by searching DNS. And even if they don't, a scan of IP addresses responding to port 80 connects will find web sites. I've noticed that hackers will attempt to break into web servers on any Comcast address within minutes of going live, so I can only assume that there is constant port scanning going on, probably through bots carried by viruses or something like that. Posted by Richard Bennett at February 21, 2005 02:24 AMSpyware applications like VX2 have trojans that browse through a computers internet cache. Then, utilizing a backdoor created by the virus and upload that information to a target server on the net. They relay the information along common http 80 or ftp routines. I'd have everyone you know that access those pages run the new Microsoft Anti-spy on their computer. Also good to use another program called Hijack This. It's a low level process viewer that actually shows you the portions of the registry linked to running processes in the background. Its also cool cause if you look in the config button under the MISC tab there is a neat little utility that flags files that are currently in use for deletion on next reboot. Saves you a trip into safe mode to remove a file that keeps hiding in memory. Posted by Josh "Hefty" Reiter at February 21, 2005 05:34 AMIf you have any external links from outside sites, that can lead right to the pages. Spiders can actively pull any web page from any directory on the net, I'm not sure if they can pierce a password protected page, but spammers would've found a way to do it if it could be done. You might want to check your server logs for any bot activity the past month or so. Posted by B.Brewer at February 21, 2005 06:28 AMIf you have any external links from outside sites, that can lead right to the pages. I don't (as far as I know). That was one of the premises of what we were doing, was that it was to be independent of the net (other than running on it for TCP/IP and HTTP). The question about it happening due to referrers from links going outside is more interesting. I'll have to go see if we have any. Spiders can actively pull any web page from any directory on the net, I'm not sure if they can pierce a password protected page, but spammers would've found a way to do it if it could be done. Why bother, unless the spiders are looking for it and adding to the data base? I'd like to think that Google isn't grabbing (and using for rankings) password-protected pages. If they are, this is an issue that should be elevated. Posted by Rand Simberg at February 21, 2005 06:33 AMHere's a faq on bots, towards the bottom of the faq, it shows how to protect yourself from these hostile bots. http://www.robotstxt.org/wc/faq.html#visit Posted by B.Brewer at February 21, 2005 06:34 AMPost a comment |