|
Full Disclosure
mailing list archives
Re: Apache 2.2.17 exploit?
From: xD 0x41 <secn3t () gmail com>
Date: Tue, 4 Oct 2011 09:48:21 +1100
Hrm interesting.. I do Index of "/what-i-am-after" , in some different ways
and usually, find many 'dumps' of interesting scanners/kits/whatever.. have
not read most of it...archived tars now.. anyhow... interesting to maybe
make a 'catcher' for these thi8ngs, i was once trying todo a sniffer for
putty logins, but it failed :(
Anyhow, i like the regex idea.nice.
xd
On 4 October 2011 01:46, Dan Dart <dandart () googlemail com> wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some
0day
and similar there and it is nice to find.
Make an RSS feed to regex through everything for "interesting" stuff..
Maybe:
/^[0-9a-f]{32}$/
Or:
/nuclear weapons/
Or even:
/^ssh-rsa/
Would be brilliant!
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: Apache 2.2.17 exploit?, (continued)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 03)
Re: Apache 2.2.17 exploit? Kai (Oct 03)
Re: Apache 2.2.17 exploit? nix (Oct 03)
Re: Apache 2.2.17 exploit? John Jacobs (Oct 03)
(Thread continues...)
|