REGEX needed to block VULN ATTACKS upload&pass=wcwc2016&login=go
Posted: 05 Apr 2017, 13:34
In my log file I have seen someone to brute a lot of vulns, there are over 256 entries, but they only try twice for each attack, then try another vuln.
However the string of
is always present.
What regex do I need to block this attack on the first attempt. i.e if it detects the first code block string regardless of path.
I have already got the WP LOGIN and XMLRPC added to regex.custom.pm from this forum.
I am just not savy enough to create my own regex.
Thanks.
However the string of
Code: Select all
"x=upload&mode=upload&upload=&ssp=RfVbHu&u=&action=upload&chdir=./&do=upload&pass=wcwc2016&login=go%21&H= "
Code: Select all
"GET /images/stories/a.php?x=upload&mode=upload&upload=&ssp=RfVbHu&u=&action=upload&chdir=./&do=upload&pass=wcwc2016&login=go%21&H= HTTP/1.1" 404 36553 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)"
I have already got the WP LOGIN and XMLRPC added to regex.custom.pm from this forum.
I am just not savy enough to create my own regex.
Thanks.