added bomb for hack scanners
w00tw00t, ratz and shits like these crash when reading the 10gb gzip file
This commit is contained in:
parent
f3838c8b17
commit
bf6b6d026f
4 changed files with 30 additions and 2 deletions
BIN
10G.gzip
Normal file
BIN
10G.gzip
Normal file
Binary file not shown.
10
bombe.php
Normal file
10
bombe.php
Normal file
|
@ -0,0 +1,10 @@
|
|||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
11
wp-login.php
11
wp-login.php
|
@ -1 +1,10 @@
|
|||
<?php header('Location: /w00tw00t-redirection-de-wp-login.php-pour-ban'); ?>
|
||||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
||||
|
|
11
xmlrpc.php
11
xmlrpc.php
|
@ -1 +1,10 @@
|
|||
<?php header('Location: /w00tw00t-redirection-de-xmlrpc.php-pour-ban'); ?>
|
||||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
||||
|
|
Reference in a new issue