× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



It was GLOBAL THERMONUCLEAR WAR. and the BACKDOOR was JOSHUA.




web400-request@xxxxxxxxxxxx
Sent by: web400-bounces@xxxxxxxxxxxx
03/13/2003 10:07 AM
Please respond to web400

 
        To:     web400@xxxxxxxxxxxx
        cc: 
        Subject:        WEB400 Digest, Vol 1, Issue 456


Send WEB400 mailing list submissions to
                 web400@xxxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
                 http://lists.midrange.com/mailman/listinfo/web400
or, via email, send a message with subject or body 'help' to
                 web400-request@xxxxxxxxxxxx

You can reach the person managing the list at
                 web400-owner@xxxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of WEB400 digest..."


Today's Topics:

   1. Re: Revenge? (Andrew Borts)
   2. Re: Revenge? (Andrew Borts)
   3. Re: Revenge? (Walden H. Leverich III)
   4. Re: Revenge? (Kevin Touchette)
   5. Re: Revenge? (Jim Franz)
   6. Re: Revenge? (Andrew Borts)


----------------------------------------------------------------------

message: 1
date: Wed, 12 Mar 2003 17:48:17 -0500
from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

Computer:                                "Hello.  Would you like to play a 
game."

Matthew Brodrick                 "Cool - let's play thermonuclear 
destruction"

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Metz, Zak [mailto:Zak_Metz@xxxxxx] 
Sent:            Monday, March 10, 2003 10:38 AM
To:              Web Enabling the AS400 / iSeries
Subject:                 [WEB400] Re: Revenge?

Well I'm in, Andrew. Let's do this thing.

Oh wait, I think we already decided this wouldn't do any good since
there's unlikely to be a real browser on the remote end. But it's an
excellent idea.

Perhaps if we could return a page or some data that would make them
*think* they found an opening, they would then visit with a real browser
and then this idea would work.

So what sort of data would I have to throw at them to make them think
they got to the (apparently highly coveted) CMD.EXE?

Z

> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Monday, March 10, 2003 10:29 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
> 
> 
> I GOT IT!!!
> 
>                Static HTML web page that opens up local porn site that 
> opens 100000's of windows on their display...  he he he he he
> 
> Redirect into HELL!!!
> 
> AND - we could get a fee for directing traffic to their 
> site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> 
> 
> HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH
> 
> Andrew Borts / Webmaster
> 
> I usually just report the IP address to my internet provider. 
>  Every once
> in a while I will check and see who the server belongs to and 
> try and get
> hold of them directly.
> 
> I would love to throw back something at them.  Maybe there is a buffer
> overflow exploit in the virus code<g>
> 
> Every couple minutes in the Apache log...
> 
> /WWW/Distortion/htdocs/scripts/root.exe
> /WWW/Distortion/htdocs/MSADC/root.exe
> /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> 
> Is there any fun to be had redirecting these hack attempts?
NOTICE: This E-mail may contain confidential information. If you are not
the addressee or the intended recipient please do not read this E-mail
and please immediately delete this e-mail message and any attachments
from your workstation or network mail system. If you are the addressee
or the intended recipient and you save or print a copy of this E-mail,
please place it in an appropriate file, depending on whether
confidential information is contained in the message.


_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.





------------------------------

message: 2
date: Wed, 12 Mar 2003 17:49:57 -0500
from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

Buy the book with Cash (as I do when I buy the Hackers Quarterly "THE 
2600" in Barns & Noble!!) 

NO PAPER TRAIL!!!

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Jim Franz [mailto:franz400@xxxxxxxxxxxx] 
Sent:            Monday, March 10, 2003 11:52 AM
To:              Web Enabling the AS400 / iSeries
Subject:                 [WEB400] Re: Revenge?

> Perhaps if we could return a page or some data that would make them
> *think* ...
I would suggest you read "Know Your Enemy - The Honeynet Project" pub by
Addison Wesley. The subtitle is "Revealing the security tools, tactics, 
and
motives of the blackhat community". It gives a good picture of the larger
population of crackers.
I would suggest it is also best not to poke a stick at a dangerous 
beast...
jim

----- Original Message -----
From: "Anton Gombkötö" <gombkoetoe@xxxxxxxxxx>
To: "Web Enabling the AS400 / iSeries" <web400@xxxxxxxxxxxx>
Sent: Monday, March 10, 2003 10:49 AM
Subject: [WEB400] Re: Revenge?


> Hello,
>
> > Perhaps if we could return a page or some data that would make them
> > *think* they found an opening, they would then visit with a real
> > browser and then this idea would work.
>
> I don't think "they" will visit you. The sites trying to "crack" you
> are victims themselves, slaves to their master somewhere completely
> else. And there are so much, that it is unlikely you pick the one the
> cracker / hacker picks if he/she does receive any answers at all.
>
> --
> Mit freundlichen Grüssen / best regards
>
> Anton Gombkötö
> Organisation und Projektleitung
>
> Avenum Technologie GmbH
> Wien - Salzburg - Stuttgart
>
> http://www.avenum.com
>
>
>
> _______________________________________________
> This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
> To post a message email: WEB400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/web400
> or email: WEB400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/web400.
>
>


_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.





------------------------------

message: 3
date: Thu, 13 Mar 2003 10:26:59 -0500
from: "Walden H. Leverich III" <WaldenL@xxxxxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction"

And the backdoor password was...???

------------
Walden H Leverich III
President
Tech Software
(516) 627-3800 x11
(208) 692-3308 eFax
WaldenL@xxxxxxxxxxxxxxx
http://www.TechSoftInc.com 

Quiquid latine dictum sit altum viditur.
(Whatever is said in Latin seems profound.)
 

-----Original Message-----
From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] 
Sent: Wednesday, March 12, 2003 5:48 PM
To: Web Enabling the AS400 / iSeries
Subject: [WEB400] Re: Revenge?


Computer:                                "Hello.  Would you like to play a 
game."

Matthew Brodrick                 "Cool - let's play thermonuclear 
destruction"

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Metz, Zak [mailto:Zak_Metz@xxxxxx] 
Sent:            Monday, March 10, 2003 10:38 AM
To:              Web Enabling the AS400 / iSeries
Subject:                 [WEB400] Re: Revenge?

Well I'm in, Andrew. Let's do this thing.

Oh wait, I think we already decided this wouldn't do any good since
there's unlikely to be a real browser on the remote end. But it's an
excellent idea.

Perhaps if we could return a page or some data that would make them
*think* they found an opening, they would then visit with a real browser
and then this idea would work.

So what sort of data would I have to throw at them to make them think
they got to the (apparently highly coveted) CMD.EXE?

Z

> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Monday, March 10, 2003 10:29 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
> 
> 
> I GOT IT!!!
> 
>                Static HTML web page that opens up local porn site that 
> opens 100000's of windows on their display...  he he he he he
> 
> Redirect into HELL!!!
> 
> AND - we could get a fee for directing traffic to their 
> site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> 
> 
> HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH
> 
> Andrew Borts / Webmaster
> 
> I usually just report the IP address to my internet provider. 
>  Every once
> in a while I will check and see who the server belongs to and 
> try and get
> hold of them directly.
> 
> I would love to throw back something at them.  Maybe there is a buffer
> overflow exploit in the virus code<g>
> 
> Every couple minutes in the Apache log...
> 
> /WWW/Distortion/htdocs/scripts/root.exe
> /WWW/Distortion/htdocs/MSADC/root.exe
> /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> 
> Is there any fun to be had redirecting these hack attempts?
NOTICE: This E-mail may contain confidential information. If you are not
the addressee or the intended recipient please do not read this E-mail
and please immediately delete this e-mail message and any attachments
from your workstation or network mail system. If you are the addressee
or the intended recipient and you save or print a copy of this E-mail,
please place it in an appropriate file, depending on whether
confidential information is contained in the message.


_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.




_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.


------------------------------

message: 4
date: Thu, 13 Mar 2003 08:31:41 -0700
from: Kevin Touchette <KTouchette@xxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

JOSHUA

-----Original Message-----
From: Walden H. Leverich III [mailto:WaldenL@xxxxxxxxxxxxxxx]
Sent: Thursday, March 13, 2003 8:27 AM
To: 'Web Enabling the AS400 / iSeries'
Subject: [WEB400] Re: Revenge?


IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction"

And the backdoor password was...???

------------
Walden H Leverich III
President
Tech Software
(516) 627-3800 x11
(208) 692-3308 eFax
WaldenL@xxxxxxxxxxxxxxx
http://www.TechSoftInc.com 

Quiquid latine dictum sit altum viditur.
(Whatever is said in Latin seems profound.)
 

-----Original Message-----
From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] 
Sent: Wednesday, March 12, 2003 5:48 PM
To: Web Enabling the AS400 / iSeries
Subject: [WEB400] Re: Revenge?


Computer:                                "Hello.  Would you like to play a 
game."

Matthew Brodrick                 "Cool - let's play thermonuclear 
destruction"

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Metz, Zak [mailto:Zak_Metz@xxxxxx] 
Sent:            Monday, March 10, 2003 10:38 AM
To:              Web Enabling the AS400 / iSeries
Subject:                 [WEB400] Re: Revenge?

Well I'm in, Andrew. Let's do this thing.

Oh wait, I think we already decided this wouldn't do any good since
there's unlikely to be a real browser on the remote end. But it's an
excellent idea.

Perhaps if we could return a page or some data that would make them
*think* they found an opening, they would then visit with a real browser
and then this idea would work.

So what sort of data would I have to throw at them to make them think
they got to the (apparently highly coveted) CMD.EXE?

Z

> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Monday, March 10, 2003 10:29 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
> 
> 
> I GOT IT!!!
> 
>                Static HTML web page that opens up local porn site that 
> opens 100000's of windows on their display...  he he he he he
> 
> Redirect into HELL!!!
> 
> AND - we could get a fee for directing traffic to their 
> site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> 
> 
> HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH
> 
> Andrew Borts / Webmaster
> 
> I usually just report the IP address to my internet provider. 
>  Every once
> in a while I will check and see who the server belongs to and 
> try and get
> hold of them directly.
> 
> I would love to throw back something at them.  Maybe there is a buffer
> overflow exploit in the virus code<g>
> 
> Every couple minutes in the Apache log...
> 
> /WWW/Distortion/htdocs/scripts/root.exe
> /WWW/Distortion/htdocs/MSADC/root.exe
> /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> 
> Is there any fun to be had redirecting these hack attempts?
NOTICE: This E-mail may contain confidential information. If you are not
the addressee or the intended recipient please do not read this E-mail
and please immediately delete this e-mail message and any attachments
from your workstation or network mail system. If you are the addressee
or the intended recipient and you save or print a copy of this E-mail,
please place it in an appropriate file, depending on whether
confidential information is contained in the message.


_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.




_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.

_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.



_________________________________________________
Scanned for viruses on 13 Mar 2003 15:40:17
No viruses found.
Virus scanning by http://erado.com


------------------------------

message: 5
date: Thu, 13 Mar 2003 10:43:53 -0500
from: "Jim Franz" <franz400@xxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

> And the backdoor password was...???
joshua


----- Original Message -----
From: "Walden H. Leverich III" <WaldenL@xxxxxxxxxxxxxxx>
To: "'Web Enabling the AS400 / iSeries'" <web400@xxxxxxxxxxxx>
Sent: Thursday, March 13, 2003 10:26 AM
Subject: [WEB400] Re: Revenge?


> IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction"
>
> And the backdoor password was...???
>
> ------------
> Walden H Leverich III
> President
> Tech Software
> (516) 627-3800 x11
> (208) 692-3308 eFax
> WaldenL@xxxxxxxxxxxxxxx
> http://www.TechSoftInc.com
>
> Quiquid latine dictum sit altum viditur.
> (Whatever is said in Latin seems profound.)
>
>
> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Wednesday, March 12, 2003 5:48 PM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
>
>
> Computer: "Hello.  Would you like to play a game."
>
> Matthew Brodrick "Cool - let's play thermonuclear destruction"
>
> Andrew Borts / Webmaster
> Seta Corporation
> 6400 East Rogers Circle
> Boca Raton, FL 33499
> E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx
> Corporate web site http://www.setacorporation.com
> E-Commerce web site http://www.palmbeachjewelry.com
> Amazon Store http://www.amazon.com/palmbeachjewelry
> Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774
>
>  -----Original Message-----
> From: Metz, Zak [mailto:Zak_Metz@xxxxxx]
> Sent: Monday, March 10, 2003 10:38 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
>
> Well I'm in, Andrew. Let's do this thing.
>
> Oh wait, I think we already decided this wouldn't do any good since
> there's unlikely to be a real browser on the remote end. But it's an
> excellent idea.
>
> Perhaps if we could return a page or some data that would make them
> *think* they found an opening, they would then visit with a real browser
> and then this idea would work.
>
> So what sort of data would I have to throw at them to make them think
> they got to the (apparently highly coveted) CMD.EXE?
>
> Z
>
> > -----Original Message-----
> > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> > Sent: Monday, March 10, 2003 10:29 AM
> > To: Web Enabling the AS400 / iSeries
> > Subject: [WEB400] Re: Revenge?
> >
> >
> > I GOT IT!!!
> >
> > Static HTML web page that opens up local porn site that
> > opens 100000's of windows on their display...  he he he he he
> >
> > Redirect into HELL!!!
> >
> > AND - we could get a fee for directing traffic to their
> > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> >
> >
> > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH
> >
> > Andrew Borts / Webmaster
> >
> > I usually just report the IP address to my internet provider.
> >  Every once
> > in a while I will check and see who the server belongs to and
> > try and get
> > hold of them directly.
> >
> > I would love to throw back something at them.  Maybe there is a buffer
> > overflow exploit in the virus code<g>
> >
> > Every couple minutes in the Apache log...
> >
> > /WWW/Distortion/htdocs/scripts/root.exe
> > /WWW/Distortion/htdocs/MSADC/root.exe
> > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> > /WWW/Distortion/htdocs/scripts/..
> > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> > /WWW/Distortion/htdocs/scripts/..
> >
> > Is there any fun to be had redirecting these hack attempts?
> NOTICE: This E-mail may contain confidential information. If you are not
> the addressee or the intended recipient please do not read this E-mail
> and please immediately delete this e-mail message and any attachments
> from your workstation or network mail system. If you are the addressee
> or the intended recipient and you save or print a copy of this E-mail,
> please place it in an appropriate file, depending on whether
> confidential information is contained in the message.
>
>
> _______________________________________________
> This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
> To post a message email: WEB400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/web400
> or email: WEB400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/web400.
>
>
>
>
> _______________________________________________
> This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
> To post a message email: WEB400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/web400
> or email: WEB400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/web400.
>
> _______________________________________________
> This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
> To post a message email: WEB400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/web400
> or email: WEB400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/web400.
>
>



------------------------------

message: 6
date: Thu, 13 Mar 2003 11:07:26 -0500
from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx>
subject: [WEB400] Re: Revenge?

Joshua... Jason?

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Walden H. Leverich III [mailto:WaldenL@xxxxxxxxxxxxxxx] 
Sent:            Thursday, March 13, 2003 10:27 AM
To:              'Web Enabling the AS400 / iSeries'
Subject:                 [WEB400] Re: Revenge?

IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction"

And the backdoor password was...???

------------
Walden H Leverich III
President
Tech Software
(516) 627-3800 x11
(208) 692-3308 eFax
WaldenL@xxxxxxxxxxxxxxx
http://www.TechSoftInc.com 

Quiquid latine dictum sit altum viditur.
(Whatever is said in Latin seems profound.)
 

-----Original Message-----
From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] 
Sent: Wednesday, March 12, 2003 5:48 PM
To: Web Enabling the AS400 / iSeries
Subject: [WEB400] Re: Revenge?


Computer:                                "Hello.  Would you like to play a 
game."

Matthew Brodrick                 "Cool - let's play thermonuclear 
destruction"

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site http://www.setacorporation.com 
E-Commerce web site http://www.palmbeachjewelry.com
Amazon Store http://www.amazon.com/palmbeachjewelry
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:            Metz, Zak [mailto:Zak_Metz@xxxxxx] 
Sent:            Monday, March 10, 2003 10:38 AM
To:              Web Enabling the AS400 / iSeries
Subject:                 [WEB400] Re: Revenge?

Well I'm in, Andrew. Let's do this thing.

Oh wait, I think we already decided this wouldn't do any good since
there's unlikely to be a real browser on the remote end. But it's an
excellent idea.

Perhaps if we could return a page or some data that would make them
*think* they found an opening, they would then visit with a real browser
and then this idea would work.

So what sort of data would I have to throw at them to make them think
they got to the (apparently highly coveted) CMD.EXE?

Z

> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Monday, March 10, 2003 10:29 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
> 
> 
> I GOT IT!!!
> 
>                Static HTML web page that opens up local porn site that 
> opens 100000's of windows on their display...  he he he he he
> 
> Redirect into HELL!!!
> 
> AND - we could get a fee for directing traffic to their 
> site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> 
> 
> HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH
> 
> Andrew Borts / Webmaster
> 
> I usually just report the IP address to my internet provider. 
>  Every once
> in a while I will check and see who the server belongs to and 
> try and get
> hold of them directly.
> 
> I would love to throw back something at them.  Maybe there is a buffer
> overflow exploit in the virus code<g>
> 
> Every couple minutes in the Apache log...
> 
> /WWW/Distortion/htdocs/scripts/root.exe
> /WWW/Distortion/htdocs/MSADC/root.exe
> /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> 
> Is there any fun to be had redirecting these hack attempts?
NOTICE: This E-mail may contain confidential information. If you are not
the addressee or the intended recipient please do not read this E-mail
and please immediately delete this e-mail message and any attachments
from your workstation or network mail system. If you are the addressee
or the intended recipient and you save or print a copy of this E-mail,
please place it in an appropriate file, depending on whether
confidential information is contained in the message.


_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.




_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.

_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.





------------------------------

_______________________________________________
This is the Web Enabling the AS400 / iSeries (WEB400) digest list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.



End of WEB400 Digest, Vol 1, Issue 456
**************************************



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.