Computer:               "Hello.  Would you like to play a game."

Matthew Brodrick        "Cool - let's play thermonuclear destruction"

Andrew Borts / Webmaster
Seta Corporation
6400 East Rogers Circle
Boca Raton, FL 33499
E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx 
Corporate web site 
E-Commerce web site
Amazon Store
Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774

 -----Original Message-----
From:   Metz, Zak [mailto:Zak_Metz@xxxxxx] 
Sent:   Monday, March 10, 2003 10:38 AM
To:     Web Enabling the AS400 / iSeries
Subject:        [WEB400] Re: Revenge?

Well I'm in, Andrew. Let's do this thing.

Oh wait, I think we already decided this wouldn't do any good since
there's unlikely to be a real browser on the remote end. But it's an
excellent idea.

Perhaps if we could return a page or some data that would make them
*think* they found an opening, they would then visit with a real browser
and then this idea would work.

So what sort of data would I have to throw at them to make them think
they got to the (apparently highly coveted) CMD.EXE?


> -----Original Message-----
> From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx]
> Sent: Monday, March 10, 2003 10:29 AM
> To: Web Enabling the AS400 / iSeries
> Subject: [WEB400] Re: Revenge?
> I GOT IT!!!
>       Static HTML web page that opens up local porn site that 
> opens 100000's of windows on their display...  he he he he he
> Redirect into HELL!!!
> AND - we could get a fee for directing traffic to their 
> site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
> Andrew Borts / Webmaster
> I usually just report the IP address to my internet provider. 
>  Every once
> in a while I will check and see who the server belongs to and 
> try and get
> hold of them directly.
> I would love to throw back something at them.  Maybe there is a buffer
> overflow exploit in the virus code<g>
> Every couple minutes in the Apache log...
> /WWW/Distortion/htdocs/scripts/root.exe
> /WWW/Distortion/htdocs/MSADC/root.exe
> /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe
> /WWW/Distortion/htdocs/scripts/..
> Is there any fun to be had redirecting these hack attempts?
NOTICE: This E-mail may contain confidential information. If you are not
the addressee or the intended recipient please do not read this E-mail
and please immediately delete this e-mail message and any attachments
from your workstation or network mail system. If you are the addressee
or the intended recipient and you save or print a copy of this E-mail,
please place it in an appropriate file, depending on whether
confidential information is contained in the message.

This is the Web Enabling the AS400 / iSeries (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.