Full Disclosure mailing list archives
Re: Apache 2.2.17 exploit?
From: Laurelai <laurelai () oneechan org>
Date: Mon, 03 Oct 2011 09:32:50 -0700
On 10/3/2011 7:31 AM, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find.Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.http://pastebin.com/ygByEV2e Thanks :) ~Darren _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Pretty sure its a trojan.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Apache 2.2.17 exploit? Darren Martyn (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Darren Martyn (Oct 03)
- Re: Apache 2.2.17 exploit? Security Mailing List (Oct 03)
- Re: Apache 2.2.17 exploit? Vincent Degat (Oct 04)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? adam (Oct 03)
- Message not available
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 04)
- Re: Apache 2.2.17 exploit? Dan Dart (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)