google has blacklisted *.php
inurl:*.php
they did this ages ago
goto page 20
ull c
need PHP shells? here's how to get them...^^
laws
The idea also concerns that those 'anonymous' proxies could also be set-up like a honey-pot, recording all that nfo. I just didn't want to make the honey-pot a proxy because it'll likely have a lot of porn.
So far laws regarding setting up a honeypot does not include setting up a server as a listening device - especially when it is a trap for people doing the illegal act - unauthorized access to a computer or network. The only problem is an ISP might find it annoying (hacker traffic) or 'scary' and shut its connection down citing TOS..
*edit-
Btw, adding warnings and disclaimers to logins "Any unauthorized connections strictly prohibited.." would probably only lead to more aggressive hacking attempts.
DNR
So far laws regarding setting up a honeypot does not include setting up a server as a listening device - especially when it is a trap for people doing the illegal act - unauthorized access to a computer or network. The only problem is an ISP might find it annoying (hacker traffic) or 'scary' and shut its connection down citing TOS..
*edit-
Btw, adding warnings and disclaimers to logins "Any unauthorized connections strictly prohibited.." would probably only lead to more aggressive hacking attempts.
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
- bad_brain
- Site Owner
- Posts: 11636
- Joined: 06 Apr 2005, 16:00
- 19
- Location: In your eye floaters.
- Contact:
honeypots are not illegal in any way as long as no damage is done to 3rd parties...but this would only apply if your server would be abused to send spam or as zombie, and that's definitely not the intention of a honeypot anyway...the intention is to make the attacker think he is control when he isn't...
SHoP
Exactly
A daemon or application can be actually a virtual machine that leads the intruder into the honeypot, social engineering the user into staying on the network long enough to be sniffed. When the intruder lets down his firewall to 'upload' to the honeypot, it is actually allowing permission for access to both computers..
I guess the wargames were actually a prelude to the next project "SHoP"...
yea, Suck-o HOney Pot....
DNR
all those wargames we played - those could have been posted as 'real sites', the same logging tools bb used to monitor the wargames could be used on the honeypot toothe intention is to make the attacker think he is control when he isn't.
A daemon or application can be actually a virtual machine that leads the intruder into the honeypot, social engineering the user into staying on the network long enough to be sniffed. When the intruder lets down his firewall to 'upload' to the honeypot, it is actually allowing permission for access to both computers..
I guess the wargames were actually a prelude to the next project "SHoP"...
yea, Suck-o HOney Pot....
DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.