lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: gdemarty at altern.org (Gilles Demarty) Subject: google getting attacks; anybody got this? --i got it. Gaurav Kumar a ?crit : > google is detecting if search contains > "inurl:member.php?action=viewpro&member=" -- myphp forum attack. > > and it gives the error... > ____________________________________________________________________ > > We're sorry... > > ... but we can't process your request right now. A computer virus > or spyware application is sending us automated requests, and it > appears that your computer or network has been infected. > > We'll restore your access as quickly as possible, so try again > soon. In the meantime, you might want to run a virus checker or > spyware remover to make sure that your computer is free of viruses and > other spurious software. > > We apologize for the inconvenience, and hope we'll see you again on Google. > ____________________________________________________________________ > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > Hi gaurav, I think i've read a few reports about this in bugtraq recently ("Google getting smarter ?!?!"). Google filters any request with "*.php*" in it. Anyway, you can still fake it by writting the request inurl:member.PHP?action=viewpro&member= , since the filter regexp take care of caps. Gilles.
Powered by blists - more mailing lists