Computer: "Hello. Would you like to play a game." Matthew Brodrick "Cool - let's play thermonuclear destruction" Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Metz, Zak [mailto:Zak_Metz@xxxxxx] Sent: Monday, March 10, 2003 10:38 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Well I'm in, Andrew. Let's do this thing. Oh wait, I think we already decided this wouldn't do any good since there's unlikely to be a real browser on the remote end. But it's an excellent idea. Perhaps if we could return a page or some data that would make them *think* they found an opening, they would then visit with a real browser and then this idea would work. So what sort of data would I have to throw at them to make them think they got to the (apparently highly coveted) CMD.EXE? Z > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Monday, March 10, 2003 10:29 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > I GOT IT!!! > > Static HTML web page that opens up local porn site that > opens 100000's of windows on their display... he he he he he > > Redirect into HELL!!! > > AND - we could get a fee for directing traffic to their > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > Andrew Borts / Webmaster > > I usually just report the IP address to my internet provider. > Every once > in a while I will check and see who the server belongs to and > try and get > hold of them directly. > > I would love to throw back something at them. Maybe there is a buffer > overflow exploit in the virus code<g> > > Every couple minutes in the Apache log... > > /WWW/Distortion/htdocs/scripts/root.exe > /WWW/Distortion/htdocs/MSADC/root.exe > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > > Is there any fun to be had redirecting these hack attempts? NOTICE: This E-mail may contain confidential information. If you are not the addressee or the intended recipient please do not read this E-mail and please immediately delete this e-mail message and any attachments from your workstation or network mail system. If you are the addressee or the intended recipient and you save or print a copy of this E-mail, please place it in an appropriate file, depending on whether confidential information is contained in the message. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400.
As an Amazon Associate we earn from qualifying purchases.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.