added bomb for hack scanners
w00tw00t, ratz and shits like these crash when reading the 10gb gzip file
Cette révision appartient à :
Parent
f3838c8b17
révision
bf6b6d026f
4 fichiers modifiés avec 30 ajouts et 2 suppressions
BIN
10G.gzip
Fichier normal
BIN
10G.gzip
Fichier normal
Fichier binaire non affiché.
10
bombe.php
Fichier normal
10
bombe.php
Fichier normal
|
@ -0,0 +1,10 @@
|
|||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
11
wp-login.php
11
wp-login.php
|
@ -1 +1,10 @@
|
|||
<?php header('Location: /w00tw00t-redirection-de-wp-login.php-pour-ban'); ?>
|
||||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
||||
|
|
11
xmlrpc.php
11
xmlrpc.php
|
@ -1 +1,10 @@
|
|||
<?php header('Location: /w00tw00t-redirection-de-xmlrpc.php-pour-ban'); ?>
|
||||
<?php
|
||||
//prepare the client to recieve GZIP data. This will not be suspicious
|
||||
//since most web servers use GZIP by default
|
||||
header("Content-Encoding: gzip");
|
||||
header("Content-Length: ".filesize('10G.gzip'));
|
||||
//Turn off output buffering
|
||||
if (ob_get_level()) ob_end_clean();
|
||||
//send the gzipped file to the client
|
||||
readfile('10G.gzip');
|
||||
?>
|
||||
|
|
Référencer dans un nouveau ticket