lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: kang at insecure.ws (kang@...ecure.ws)
Subject: http://xfteam.net/fedor.c - Anyone seen this
 before??

bah...

$INFO['sql_driver']			=	'mySQL';
$INFO['sql_host']			=	'localhost';
$INFO['sql_database']			=	'xfteam_ivbd1';
$INFO['sql_pass']			=	'FuE7sPjIwm';
$INFO['sql_port']			=	'';
$INFO['sql_tbl_prefix']			=	'ibf_';
$INFO['sql_user']			=	'xfteam_ivbd1';



telnet xfteam.net 3306
Trying 69.56.243.146...
Connected to xfteam.net.
Escape character is '^]'.
0
4.0.15-standard )n*$r7W0,,
Connection closed by foreign host.


also, see
http://xfteam.net/remote.php?&c=v&d=%2Fhome%2Fxfteam%2Fpublic_html%2F&f=strings.txt
about the things they are looking for
and
http://xfteam.net/remote.php?&c=v&d=%2Fhome%2Fxfteam%2Fpublic_html%2F&f=google.jpg&ftype=2&fnot=1
about the scan they are doing


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ