[nycphp-talk] I've been hit with an eval(base64_decode("....")) injection attack
Sasa Rakic - Gmail
rakics at gmail.com
Mon Apr 2 09:51:22 EDT 2012
Hi,
I am sending find-virus script, that should be run over the browser.
It find hidden iframes, possisble some JavaScript virus
"<script type=\"text/javascript\">var"
and it can be easy added code to find base64 JavaScript code.
Best regards,
Sasa
From: talk-bounces at lists.nyphp.org [mailto:talk-bounces at lists.nyphp.org] On
Behalf Of David Mintz
Sent: Tuesday, March 27, 2012 9:55 PM
To: NYPHP Talk
Subject: Re: [nycphp-talk] I've been hit with an eval(base64_decode("...."))
injection attack
On Tue, Mar 27, 2012 at 12:30 PM, Matthew Kaufman <mkfmncom at gmail.com>
wrote:
Yeah SoftLayer is a good host. What was the other dedicated host also, that
was owned by ex-RackSpace, for dedicated?
you're probably thinking of Slicehost.
--
David Mintz
http://davidmintz.org/
It ain't over:
http://www.healthcare-now.org/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120402/f16bf100/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: find-virus.php
Type: application/octet-stream
Size: 1662 bytes
Desc: not available
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120402/f16bf100/attachment.obj>
More information about the talk
mailing list