|
It was GLOBAL THERMONUCLEAR WAR. and the BACKDOOR was JOSHUA. web400-request@xxxxxxxxxxxx Sent by: web400-bounces@xxxxxxxxxxxx 03/13/2003 10:07 AM Please respond to web400 To: web400@xxxxxxxxxxxx cc: Subject: WEB400 Digest, Vol 1, Issue 456 Send WEB400 mailing list submissions to web400@xxxxxxxxxxxx To subscribe or unsubscribe via the World Wide Web, visit http://lists.midrange.com/mailman/listinfo/web400 or, via email, send a message with subject or body 'help' to web400-request@xxxxxxxxxxxx You can reach the person managing the list at web400-owner@xxxxxxxxxxxx When replying, please edit your Subject line so it is more specific than "Re: Contents of WEB400 digest..." Today's Topics: 1. Re: Revenge? (Andrew Borts) 2. Re: Revenge? (Andrew Borts) 3. Re: Revenge? (Walden H. Leverich III) 4. Re: Revenge? (Kevin Touchette) 5. Re: Revenge? (Jim Franz) 6. Re: Revenge? (Andrew Borts) ---------------------------------------------------------------------- message: 1 date: Wed, 12 Mar 2003 17:48:17 -0500 from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx> subject: [WEB400] Re: Revenge? Computer: "Hello. Would you like to play a game." Matthew Brodrick "Cool - let's play thermonuclear destruction" Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Metz, Zak [mailto:Zak_Metz@xxxxxx] Sent: Monday, March 10, 2003 10:38 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Well I'm in, Andrew. Let's do this thing. Oh wait, I think we already decided this wouldn't do any good since there's unlikely to be a real browser on the remote end. But it's an excellent idea. Perhaps if we could return a page or some data that would make them *think* they found an opening, they would then visit with a real browser and then this idea would work. So what sort of data would I have to throw at them to make them think they got to the (apparently highly coveted) CMD.EXE? Z > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Monday, March 10, 2003 10:29 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > I GOT IT!!! > > Static HTML web page that opens up local porn site that > opens 100000's of windows on their display... he he he he he > > Redirect into HELL!!! > > AND - we could get a fee for directing traffic to their > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > Andrew Borts / Webmaster > > I usually just report the IP address to my internet provider. > Every once > in a while I will check and see who the server belongs to and > try and get > hold of them directly. > > I would love to throw back something at them. Maybe there is a buffer > overflow exploit in the virus code<g> > > Every couple minutes in the Apache log... > > /WWW/Distortion/htdocs/scripts/root.exe > /WWW/Distortion/htdocs/MSADC/root.exe > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > > Is there any fun to be had redirecting these hack attempts? NOTICE: This E-mail may contain confidential information. If you are not the addressee or the intended recipient please do not read this E-mail and please immediately delete this e-mail message and any attachments from your workstation or network mail system. If you are the addressee or the intended recipient and you save or print a copy of this E-mail, please place it in an appropriate file, depending on whether confidential information is contained in the message. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. ------------------------------ message: 2 date: Wed, 12 Mar 2003 17:49:57 -0500 from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx> subject: [WEB400] Re: Revenge? Buy the book with Cash (as I do when I buy the Hackers Quarterly "THE 2600" in Barns & Noble!!) NO PAPER TRAIL!!! Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Jim Franz [mailto:franz400@xxxxxxxxxxxx] Sent: Monday, March 10, 2003 11:52 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? > Perhaps if we could return a page or some data that would make them > *think* ... I would suggest you read "Know Your Enemy - The Honeynet Project" pub by Addison Wesley. The subtitle is "Revealing the security tools, tactics, and motives of the blackhat community". It gives a good picture of the larger population of crackers. I would suggest it is also best not to poke a stick at a dangerous beast... jim ----- Original Message ----- From: "Anton Gombkötö" <gombkoetoe@xxxxxxxxxx> To: "Web Enabling the AS400 / iSeries" <web400@xxxxxxxxxxxx> Sent: Monday, March 10, 2003 10:49 AM Subject: [WEB400] Re: Revenge? > Hello, > > > Perhaps if we could return a page or some data that would make them > > *think* they found an opening, they would then visit with a real > > browser and then this idea would work. > > I don't think "they" will visit you. The sites trying to "crack" you > are victims themselves, slaves to their master somewhere completely > else. And there are so much, that it is unlikely you pick the one the > cracker / hacker picks if he/she does receive any answers at all. > > -- > Mit freundlichen Grüssen / best regards > > Anton Gombkötö > Organisation und Projektleitung > > Avenum Technologie GmbH > Wien - Salzburg - Stuttgart > > http://www.avenum.com > > > > _______________________________________________ > This is the Web Enabling the AS400 / iSeries (WEB400) mailing list > To post a message email: WEB400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/web400 > or email: WEB400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/web400. > > _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. ------------------------------ message: 3 date: Thu, 13 Mar 2003 10:26:59 -0500 from: "Walden H. Leverich III" <WaldenL@xxxxxxxxxxxxxxx> subject: [WEB400] Re: Revenge? IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction" And the backdoor password was...??? ------------ Walden H Leverich III President Tech Software (516) 627-3800 x11 (208) 692-3308 eFax WaldenL@xxxxxxxxxxxxxxx http://www.TechSoftInc.com Quiquid latine dictum sit altum viditur. (Whatever is said in Latin seems profound.) -----Original Message----- From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] Sent: Wednesday, March 12, 2003 5:48 PM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Computer: "Hello. Would you like to play a game." Matthew Brodrick "Cool - let's play thermonuclear destruction" Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Metz, Zak [mailto:Zak_Metz@xxxxxx] Sent: Monday, March 10, 2003 10:38 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Well I'm in, Andrew. Let's do this thing. Oh wait, I think we already decided this wouldn't do any good since there's unlikely to be a real browser on the remote end. But it's an excellent idea. Perhaps if we could return a page or some data that would make them *think* they found an opening, they would then visit with a real browser and then this idea would work. So what sort of data would I have to throw at them to make them think they got to the (apparently highly coveted) CMD.EXE? Z > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Monday, March 10, 2003 10:29 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > I GOT IT!!! > > Static HTML web page that opens up local porn site that > opens 100000's of windows on their display... he he he he he > > Redirect into HELL!!! > > AND - we could get a fee for directing traffic to their > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > Andrew Borts / Webmaster > > I usually just report the IP address to my internet provider. > Every once > in a while I will check and see who the server belongs to and > try and get > hold of them directly. > > I would love to throw back something at them. Maybe there is a buffer > overflow exploit in the virus code<g> > > Every couple minutes in the Apache log... > > /WWW/Distortion/htdocs/scripts/root.exe > /WWW/Distortion/htdocs/MSADC/root.exe > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > > Is there any fun to be had redirecting these hack attempts? NOTICE: This E-mail may contain confidential information. If you are not the addressee or the intended recipient please do not read this E-mail and please immediately delete this e-mail message and any attachments from your workstation or network mail system. If you are the addressee or the intended recipient and you save or print a copy of this E-mail, please place it in an appropriate file, depending on whether confidential information is contained in the message. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. ------------------------------ message: 4 date: Thu, 13 Mar 2003 08:31:41 -0700 from: Kevin Touchette <KTouchette@xxxxxxxxxxxx> subject: [WEB400] Re: Revenge? JOSHUA -----Original Message----- From: Walden H. Leverich III [mailto:WaldenL@xxxxxxxxxxxxxxx] Sent: Thursday, March 13, 2003 8:27 AM To: 'Web Enabling the AS400 / iSeries' Subject: [WEB400] Re: Revenge? IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction" And the backdoor password was...??? ------------ Walden H Leverich III President Tech Software (516) 627-3800 x11 (208) 692-3308 eFax WaldenL@xxxxxxxxxxxxxxx http://www.TechSoftInc.com Quiquid latine dictum sit altum viditur. (Whatever is said in Latin seems profound.) -----Original Message----- From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] Sent: Wednesday, March 12, 2003 5:48 PM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Computer: "Hello. Would you like to play a game." Matthew Brodrick "Cool - let's play thermonuclear destruction" Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Metz, Zak [mailto:Zak_Metz@xxxxxx] Sent: Monday, March 10, 2003 10:38 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Well I'm in, Andrew. Let's do this thing. Oh wait, I think we already decided this wouldn't do any good since there's unlikely to be a real browser on the remote end. But it's an excellent idea. Perhaps if we could return a page or some data that would make them *think* they found an opening, they would then visit with a real browser and then this idea would work. So what sort of data would I have to throw at them to make them think they got to the (apparently highly coveted) CMD.EXE? Z > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Monday, March 10, 2003 10:29 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > I GOT IT!!! > > Static HTML web page that opens up local porn site that > opens 100000's of windows on their display... he he he he he > > Redirect into HELL!!! > > AND - we could get a fee for directing traffic to their > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > Andrew Borts / Webmaster > > I usually just report the IP address to my internet provider. > Every once > in a while I will check and see who the server belongs to and > try and get > hold of them directly. > > I would love to throw back something at them. Maybe there is a buffer > overflow exploit in the virus code<g> > > Every couple minutes in the Apache log... > > /WWW/Distortion/htdocs/scripts/root.exe > /WWW/Distortion/htdocs/MSADC/root.exe > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > > Is there any fun to be had redirecting these hack attempts? NOTICE: This E-mail may contain confidential information. If you are not the addressee or the intended recipient please do not read this E-mail and please immediately delete this e-mail message and any attachments from your workstation or network mail system. If you are the addressee or the intended recipient and you save or print a copy of this E-mail, please place it in an appropriate file, depending on whether confidential information is contained in the message. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _________________________________________________ Scanned for viruses on 13 Mar 2003 15:40:17 No viruses found. Virus scanning by http://erado.com ------------------------------ message: 5 date: Thu, 13 Mar 2003 10:43:53 -0500 from: "Jim Franz" <franz400@xxxxxxxxxxxx> subject: [WEB400] Re: Revenge? > And the backdoor password was...??? joshua ----- Original Message ----- From: "Walden H. Leverich III" <WaldenL@xxxxxxxxxxxxxxx> To: "'Web Enabling the AS400 / iSeries'" <web400@xxxxxxxxxxxx> Sent: Thursday, March 13, 2003 10:26 AM Subject: [WEB400] Re: Revenge? > IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction" > > And the backdoor password was...??? > > ------------ > Walden H Leverich III > President > Tech Software > (516) 627-3800 x11 > (208) 692-3308 eFax > WaldenL@xxxxxxxxxxxxxxx > http://www.TechSoftInc.com > > Quiquid latine dictum sit altum viditur. > (Whatever is said in Latin seems profound.) > > > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Wednesday, March 12, 2003 5:48 PM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > Computer: "Hello. Would you like to play a game." > > Matthew Brodrick "Cool - let's play thermonuclear destruction" > > Andrew Borts / Webmaster > Seta Corporation > 6400 East Rogers Circle > Boca Raton, FL 33499 > E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx > Corporate web site http://www.setacorporation.com > E-Commerce web site http://www.palmbeachjewelry.com > Amazon Store http://www.amazon.com/palmbeachjewelry > Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 > > -----Original Message----- > From: Metz, Zak [mailto:Zak_Metz@xxxxxx] > Sent: Monday, March 10, 2003 10:38 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > Well I'm in, Andrew. Let's do this thing. > > Oh wait, I think we already decided this wouldn't do any good since > there's unlikely to be a real browser on the remote end. But it's an > excellent idea. > > Perhaps if we could return a page or some data that would make them > *think* they found an opening, they would then visit with a real browser > and then this idea would work. > > So what sort of data would I have to throw at them to make them think > they got to the (apparently highly coveted) CMD.EXE? > > Z > > > -----Original Message----- > > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > > Sent: Monday, March 10, 2003 10:29 AM > > To: Web Enabling the AS400 / iSeries > > Subject: [WEB400] Re: Revenge? > > > > > > I GOT IT!!! > > > > Static HTML web page that opens up local porn site that > > opens 100000's of windows on their display... he he he he he > > > > Redirect into HELL!!! > > > > AND - we could get a fee for directing traffic to their > > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > > > Andrew Borts / Webmaster > > > > I usually just report the IP address to my internet provider. > > Every once > > in a while I will check and see who the server belongs to and > > try and get > > hold of them directly. > > > > I would love to throw back something at them. Maybe there is a buffer > > overflow exploit in the virus code<g> > > > > Every couple minutes in the Apache log... > > > > /WWW/Distortion/htdocs/scripts/root.exe > > /WWW/Distortion/htdocs/MSADC/root.exe > > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > > /WWW/Distortion/htdocs/scripts/.. > > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > > /WWW/Distortion/htdocs/scripts/.. > > > > Is there any fun to be had redirecting these hack attempts? > NOTICE: This E-mail may contain confidential information. If you are not > the addressee or the intended recipient please do not read this E-mail > and please immediately delete this e-mail message and any attachments > from your workstation or network mail system. If you are the addressee > or the intended recipient and you save or print a copy of this E-mail, > please place it in an appropriate file, depending on whether > confidential information is contained in the message. > > > _______________________________________________ > This is the Web Enabling the AS400 / iSeries (WEB400) mailing list > To post a message email: WEB400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/web400 > or email: WEB400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/web400. > > > > > _______________________________________________ > This is the Web Enabling the AS400 / iSeries (WEB400) mailing list > To post a message email: WEB400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/web400 > or email: WEB400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/web400. > > _______________________________________________ > This is the Web Enabling the AS400 / iSeries (WEB400) mailing list > To post a message email: WEB400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/web400 > or email: WEB400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/web400. > > ------------------------------ message: 6 date: Thu, 13 Mar 2003 11:07:26 -0500 from: "Andrew Borts" <Andrewb@xxxxxxxxxxxxxxxxxxx> subject: [WEB400] Re: Revenge? Joshua... Jason? Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Walden H. Leverich III [mailto:WaldenL@xxxxxxxxxxxxxxx] Sent: Thursday, March 13, 2003 10:27 AM To: 'Web Enabling the AS400 / iSeries' Subject: [WEB400] Re: Revenge? IIRC, it's "...thermonuclear WAR" not "thermonuclear destruction" And the backdoor password was...??? ------------ Walden H Leverich III President Tech Software (516) 627-3800 x11 (208) 692-3308 eFax WaldenL@xxxxxxxxxxxxxxx http://www.TechSoftInc.com Quiquid latine dictum sit altum viditur. (Whatever is said in Latin seems profound.) -----Original Message----- From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] Sent: Wednesday, March 12, 2003 5:48 PM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Computer: "Hello. Would you like to play a game." Matthew Brodrick "Cool - let's play thermonuclear destruction" Andrew Borts / Webmaster Seta Corporation 6400 East Rogers Circle Boca Raton, FL 33499 E-mail: Andrewb@xxxxxxxxxxxxxxxxxxx Corporate web site http://www.setacorporation.com E-Commerce web site http://www.palmbeachjewelry.com Amazon Store http://www.amazon.com/palmbeachjewelry Voice: 561-994-2660 Ext. 2211 / Fax: 561-997-0774 -----Original Message----- From: Metz, Zak [mailto:Zak_Metz@xxxxxx] Sent: Monday, March 10, 2003 10:38 AM To: Web Enabling the AS400 / iSeries Subject: [WEB400] Re: Revenge? Well I'm in, Andrew. Let's do this thing. Oh wait, I think we already decided this wouldn't do any good since there's unlikely to be a real browser on the remote end. But it's an excellent idea. Perhaps if we could return a page or some data that would make them *think* they found an opening, they would then visit with a real browser and then this idea would work. So what sort of data would I have to throw at them to make them think they got to the (apparently highly coveted) CMD.EXE? Z > -----Original Message----- > From: Andrew Borts [mailto:Andrewb@xxxxxxxxxxxxxxxxxxx] > Sent: Monday, March 10, 2003 10:29 AM > To: Web Enabling the AS400 / iSeries > Subject: [WEB400] Re: Revenge? > > > I GOT IT!!! > > Static HTML web page that opens up local porn site that > opens 100000's of windows on their display... he he he he he > > Redirect into HELL!!! > > AND - we could get a fee for directing traffic to their > site!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > > > HEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHEHHEEHHEH > > Andrew Borts / Webmaster > > I usually just report the IP address to my internet provider. > Every once > in a while I will check and see who the server belongs to and > try and get > hold of them directly. > > I would love to throw back something at them. Maybe there is a buffer > overflow exploit in the virus code<g> > > Every couple minutes in the Apache log... > > /WWW/Distortion/htdocs/scripts/root.exe > /WWW/Distortion/htdocs/MSADC/root.exe > /WWW/Distortion/htdocs/c/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/d/winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > /WWW/Distortion/htdocs/scripts/..À¯../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/..Á ../winnt/system32/cmd.exe > /WWW/Distortion/htdocs/scripts/.. > > Is there any fun to be had redirecting these hack attempts? NOTICE: This E-mail may contain confidential information. If you are not the addressee or the intended recipient please do not read this E-mail and please immediately delete this e-mail message and any attachments from your workstation or network mail system. If you are the addressee or the intended recipient and you save or print a copy of this E-mail, please place it in an appropriate file, depending on whether confidential information is contained in the message. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) mailing list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. ------------------------------ _______________________________________________ This is the Web Enabling the AS400 / iSeries (WEB400) digest list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/web400 or email: WEB400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/web400. End of WEB400 Digest, Vol 1, Issue 456 **************************************
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.