lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: iago at valhallalegends.com (Ron) Subject: Exploiting apache That's an exploit for some IIS vulnerability. A google search will turn it up immediately. International-Asso@....de wrote: >Hello everyone, > >Last time I have checked my apache log files, I made a >funny discovery. > >There was the following logfile entry: > >############################################### >84.XX.XX.159 - - [31/Jan/2005:22:46:38 +0000] "SEARCH >/\x90\x02\xb1\x02\xb1\x02\xb1\x02\xb1\[...] >############################################### > > >Having a closer lock at the structure of this entry... > >############################################################### >"SEARCH \x90[\x02\xb1 (reapeated 1075 times)][\x90 (repeated 10332 times)]" >############################################################### > > >So, is this a part of an expoit or is it just a funny malformed query? > >If it is an exploit, is there a straigt forward method for reengineering > this expoit? > > >Thanks in advance, >markus >______________________________________________________________ >Verschicken Sie romantische, coole und witzige Bilder per SMS! >Jetzt bei WEB.DE FreeMail: http://f.web.de/?mc=021193 > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > > > >
Powered by blists - more mailing lists