PaulDotCom mailing list archives

Trolling with robots.txt


From: jwright at hasborg.com (Joshua Wright)
Date: Sun, 01 Feb 2009 15:25:47 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I have done this on a few websites I manage, effectively:

$ cat robots.txt
User-agent: *
Disallow: /admin
Disallow: /images

$ cat admin/index.php
<?php
$to = "recipient at example.com";
$subject = "Robots honeypot from $_SERVER['REMOTE_ADDR']";
$body = "User at $_SERVER['REMOTE_ADDR'] tripped robots honeypot.\nI
could add more remote attributes such as User-Agent here\n";
mail($to, $subject, $body);

echo("<html><h1>Congratulations, you found the secret page.  Now email
$to to avoid being blacklisted.</h1></html>");
?>

You get the idea. :)

- -Josh

Adrian Crenshaw wrote:
Has anyone else ever considered trolling/honey-potting using the robots.txt
file on their site?

Adrian



------------------------------------------------------------------------

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAkmGBUsACgkQapC4Te3oxYx5zgCfTimIuFulnMife869c2oVE7cM
w3IAoI8npUdXSPKfW39Gw1oE+B2fk/7C
=mdlt
-----END PGP SIGNATURE-----


Current thread: