![]() How do I interpret these requests? What's the strategy behind it? Given the high frequency of requests per minute I'd say it's part of a scanning framework, so it should be documented somewhere. ![]() ![]() The amount of requests comes in at about 25 - 30 per second, which is not different from other scanning attempts. These attempts are sometimes mixed with XSS and SQLI attempts, other times they're just thousands of requests like this. In the weekend one of the servers got targeted by automated scanning attempts, reviewing the logs I noticed a new strategy, but I can't make head or tails of the intent of this attempt. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |