I was pointing out that it is shortsighted to assume calls to "index2.php" are a Joomla exploit sniff
From the 'cracking' point of view it does not matter if you think it is "short-sighted", it is how expedient it is.
If I wanted to identify Joomla! sites to attack it pays me
NOT to try 'hacking'
every URL on this million+ site list, because the vast majority of them are NOT going to be Joomla! and therefore a waste of time trying to hack them, so I run a
trivial request for a
known document name on Joomla and if the response code is
not 404 that request is regarded as a positive so is marked for more extensive querying.
This way a million plus list with an success rate of probably much less than ten percent can be thinned out to
much smaller list with a potential success rate of ~forty percent in only a few hours.
The Joomla! sites that are identified on the first run have no idea that they ARE about to become a target, and the sites that are not Joomla! just see a failed URL request which they disregard because it has failed for an obvious reason, that being; it does not exist, and for the 'cracker' they have increased their chances of 'real' hit significantly by doing nothing other than code a trivial HTTP: 'HEAD' or 'GET' request in their preferred language and starting it running.
You are thinking like a developer and thinking about what would be the "elegant" solution, malicious 'hackers' are not interested in being 'elegant' they just want to find the most likely candidates in the shortest possible time, and whenever I find a log entry with a UA (User Agent) of 'script' on any of my 'honeypot' sites requesting a URL that I
KNOW would not be
normally requested by an external UA, it gets blocked at the server firewall for a couple of weeks, because we have clients on the same server using Joomla! [or whatever], that we need to protect where possible.
I see this kind of request hundreds of times a day, mainly from IPs in Eastern Europe, South East Asia, South America, plus IPs from Amazon and Google 'Cloud' services, cheap end VPS providers (Rackspace, Godaddy and Hostgator predominantly).
Every day I 'grep' out a list of possible 'rogue' log entries from server logs and have scripts on my machine that I can feed in a list of IPs and get back a geoiplookup report, a whois report and a hostname report.
I try to think like a 'hacker' because prevention and a little anticipation IS far, far better than curing a compromised server.
Chris.
Indifference will be the downfall of mankind, but who cares?
Time flies like an arrow, however, fruit flies like a banana.
Never mind this jesus character,
stars had to die for me to live.