Re: New user - Very funny
by thundergnat (Deacon) on Jun 19, 2005 at 19:34 UTC
|
There were about 8-10 lame crack attempts like that in the snippets section earlier too, though it looks like they've all been reaped at this point.
| [reply] |
|
|
| [reply] |
|
|
Dunno, but they really need to discover girls. Or boys. Or barnyard animals.
| [reply] |
|
|
|
|
|
|
|
|
Any physical age is possible; however, their mental age seems to be in the teenager years...
--------------------------------
An idea is not responsible for the people who believe in it...
| [reply] |
Re: New user - Very funny
by aufflick (Deacon) on Jun 23, 2005 at 05:02 UTC
|
We're just lucky this hacker didn't find out that you need to go back 21 directory levels to escape out of the username field.
One more and the server would have been toast.
Of course hackers had more patience in my day. Why I remember when... | [reply] |
Re: New user - Very funny
by marnanel (Beadle) on Jun 19, 2005 at 19:25 UTC
|
Where did you see this? In your webserver logs?
It looks like an attempt to break out of the base directory of some kind of server and get to read your /etc/passwd (presumably to help in cracking passwords on your machine).
| [reply] |
|
|
| [reply] |
Re: New user - Very funny
by SciDude (Friar) on Jun 22, 2005 at 17:02 UTC
|
NodeReaper needs to locate his cousin, UserReaper to delete this garbage.
SciDude
The first dog barks... all other dogs bark at the first dog.
| [reply] |
Re: New user - Very funny
by crashtest (Curate) on Jun 25, 2005 at 16:35 UTC
|
Can someone explain to me the point of placing a possible path to the password file in the "new username" ($nu_name) field? Wouldn't that only pay off if that input were used somewhere in an open call, which seems highly unlikely? In fact, I'd only see a point in attempting a SQL injection attack at this point (any users named foo' OR 'a'='a out there?)
I think you'd be a fool to think that the [id://pmdev]s on PerlMonks left any obvious security holes. That's not to say there's never been a security breach here before! | [reply] [d/l] |