Use of Alternate Data Streams in Research Scans for index.jsp.
Last Updated: 2022-01-14 14:54:49 UTC
by Johannes Ullrich (Version: 1)
Our network of web application honeypots delivered some odd new URLs in the last 24 hrs:
I am not 100% sure what these scans are after, but my best guess right now is that they are attempting to bypass filters using NTFS alternate data streams.
The Windows NTFS file system includes the ability to connect to alternate data streams. This has been documented in the past as a technique to hide data or to bypass URL filters .
In this case, the scans originate from 126.96.36.199 , an IP associated with vulnerability scanning company Qualys. It appears to be hunting for index.jsp, a default for Java applications. Inside the cgi-bin or scripts directory, it may very well lead to code execution and may be protected by a WAF that the attacker attempts to bypass. I assume that right now, this is likely just a Qualys research project, but a good reminder to double-check your URL filters
Any other ideas? Let me know.
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu