need PHP shells? here's how to get them...^^

No explicit questions like "how do I hack xxx.com" please!
rhysh
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 767
Joined: 15 Nov 2006, 17:00
17
Contact:

Post by rhysh »

google has blacklisted *.php

inurl:*.php


they did this ages ago

goto page 20

ull c

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

inurl:upload.php works.... :wink:

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

laws

Post by DNR »

The idea also concerns that those 'anonymous' proxies could also be set-up like a honey-pot, recording all that nfo. I just didn't want to make the honey-pot a proxy because it'll likely have a lot of porn.

So far laws regarding setting up a honeypot does not include setting up a server as a listening device - especially when it is a trap for people doing the illegal act - unauthorized access to a computer or network. The only problem is an ISP might find it annoying (hacker traffic) or 'scary' and shut its connection down citing TOS..

*edit-
Btw, adding warnings and disclaimers to logins "Any unauthorized connections strictly prohibited.." would probably only lead to more aggressive hacking attempts.
:wink:

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

honeypots are not illegal in any way as long as no damage is done to 3rd parties...but this would only apply if your server would be abused to send spam or as zombie, and that's definitely not the intention of a honeypot anyway...the intention is to make the attacker think he is control when he isn't... :wink:

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

SHoP

Post by DNR »

Exactly :wink:
the intention is to make the attacker think he is control when he isn't.
all those wargames we played - those could have been posted as 'real sites', the same logging tools bb used to monitor the wargames could be used on the honeypot too :lol:

A daemon or application can be actually a virtual machine that leads the intruder into the honeypot, social engineering the user into staying on the network long enough to be sniffed. When the intruder lets down his firewall to 'upload' to the honeypot, it is actually allowing permission for access to both computers..

I guess the wargames were actually a prelude to the next project "SHoP"...

yea, Suck-o HOney Pot.... :lol:

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

Post Reply