Hi,
for quite some time someone is fireing on one of my customers WebObjects applications,
that very much looks like a bot net.
The firing occurs always on the same instance and the same WO action for each request, its
trying another session id. So this looks like someone is doing a brute force
attack to guess a valid session id.
So I am wondering: is there a known weakness in the randomness of generated session ids,
that is making this (guessing a valid session id) possible at all?
Regards, Markus
they are obviously not respecting the robots.txt and the observed behaviour does not match
the expected behaviour for a crawler/bot