PaulDotCom mailing list archives
Trolling with robots.txt
From: jwright at hasborg.com (Joshua Wright)
Date: Sun, 01 Feb 2009 15:25:47 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I have done this on a few websites I manage, effectively: $ cat robots.txt User-agent: * Disallow: /admin Disallow: /images $ cat admin/index.php <?php $to = "recipient at example.com"; $subject = "Robots honeypot from $_SERVER['REMOTE_ADDR']"; $body = "User at $_SERVER['REMOTE_ADDR'] tripped robots honeypot.\nI could add more remote attributes such as User-Agent here\n"; mail($to, $subject, $body); echo("<html><h1>Congratulations, you found the secret page. Now email $to to avoid being blacklisted.</h1></html>"); ?> You get the idea. :) - -Josh Adrian Crenshaw wrote:
Has anyone else ever considered trolling/honey-potting using the robots.txt file on their site? Adrian ------------------------------------------------------------------------ _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) iEYEARECAAYFAkmGBUsACgkQapC4Te3oxYx5zgCfTimIuFulnMife869c2oVE7cM w3IAoI8npUdXSPKfW39Gw1oE+B2fk/7C =mdlt -----END PGP SIGNATURE-----
Current thread:
- Trolling with robots.txt Adrian Crenshaw (Jan 31)
- Trolling with robots.txt Joshua Wright (Feb 01)
- Trolling with robots.txt Adrian Crenshaw (Feb 01)
- Trolling with robots.txt Joshua Wright (Feb 01)