Skip to main content

Help Mitigating High Volume Distributed Attack on Port 443 Targeting GET /moodlee/index.php?

Comments

3 comments

  • cPRex Jurassic Moderator

    Hey there!  If the attack is really that large there isn't going to be anything I can recommend on my end, and CSF likely isn't advanced enough to handle that.  You'll want to look into an external hardware firewall or a tool like Cloudlfare in order to handle that type of traffic.

    0
  • Oktavia Iw

    When i'am remove the domain, attacker auto change target to other domain.

    0
  • InterServed

    I would make sure that the captcha is working as expected with litespeed.

    If you want it applied to all users globally, use:
    Insert the Rewrite Rule Edit or create the file: /etc/apache2/conf.d/userdata/captcha.conf
    Restart LiteSpeed: /scripts/restartsrv_httpd

    If applying it per domain, use:
    /etc/apache2/conf.d/userdata/std/2_4/yourusername/yourdomain.com/captcha.conf
    Restart LiteSpeed: /scripts/restartsrv_httpd

    <IfModule LiteSpeed>
    RewriteEngine On

    # If the query string contains 'Site_ID=acgwin', trigger CAPTCHA
    RewriteCond %{QUERY_STRING} (^|&)Site_ID=acgwin($|&) [NC]
    RewriteRule .* - [E=verifycaptcha:deny]

    </IfModule>
    0

Please sign in to leave a comment.