revolt
writt3n by: Jared BravermanSECNAP Network Security Corp.
www.secnap.com
revolt is a scanner for phpMyAdmin installations. I don’t know what vulnerable servers are “used” for though.
… "HEAD http://…:80/phpmy/ HTTP/1.1" 403 0 "-" "revolt"
… "HEAD http://…:80/phppma/ HTTP/1.1" 403 0 "-" "revolt"
… "HEAD http://…:80/myadmin/ HTTP/1.1" 403 0 "-" "revolt"
revolt tries a large number of possible URIs – almost 100 variations in one scan. revolt also doesn’t seem to know any host names of the IP address.
THIS IS THE SIGNATURE THAT WAS CREATED TO DETECT REVOLT
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB PHP Attack Tool Revolt Scanner"; flow:established,to_server; content:"User-Agent: revolt "; nocase; reference:url,www. Whitehatsecurityresponse.blogspot.com; classtype:web-application-attack; sid:2009300; rev:1;)
THANKS TO:
http://johannburkard.de/blog/www/spam/morfeus-fucking-scanner-revolt-other-vulnerability-scanners.html
