Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> They aren’t parsing those PHP files, they are using their existence for fingerprinting — they are trying to determine the existence of known vulnerabilities.

So would the natural strategy then be to flag some vulnerability of interest? Either one typically requiring more manual effort (waste their time), or one that is easily automated so as to trap a bot in a honeybot i.e. "you got in, what do next? oh upload all your kit and show how you work? sure" see: the cuckoos egg



Yeah I have been considering doing this on my honeypot.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: