lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <b288873ce084ab8349d45598b7a61e7f@rhynn.net> Date: Sat, 19 May 2012 01:01:01 +0400 From: Kai <kai@...nn.net> To: <full-disclosure@...ts.grok.org.uk> Subject: Re: Checking out backdoor shells Dear Mr. MustLive#2, hello and welcome to the full-disclosure mailing list. Faithfully yours On Fri, 18 May 2012 15:50:04 -0500, Adam Behnke wrote: > A backdoor shell can be a PHP, ASP, JSP, etc. piece of code which can > be > uploaded on a site to gain or retain access and some privileges on a > website. Once uploaded, it allows the attacker to execute commands > through > the shell_exec () function, upload/delete/modify/download files from > the web > server, and many more. For defacers, it allows them to navigate > easily to > the directory of the public_html or /var/www and modify the index of > the > page. -- Cheers, Kai _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists