NYCPHP Meetup

NYPHP.org

[nycphp-talk] I've been hit with an eval(base64_decode("....")) injection attack

Sasa Rakic - Gmail rakics at gmail.com
Mon Apr 2 09:51:22 EDT 2012


Hi,

 

I am sending find-virus script, that should be run over the browser.

 

It find hidden iframes, possisble some JavaScript virus

 

"<script type=\"text/javascript\">var"

 

and it can be easy added code to find base64 JavaScript code.

 

Best regards,

Sasa

 

From: talk-bounces at lists.nyphp.org [mailto:talk-bounces at lists.nyphp.org] On
Behalf Of David Mintz
Sent: Tuesday, March 27, 2012 9:55 PM
To: NYPHP Talk
Subject: Re: [nycphp-talk] I've been hit with an eval(base64_decode("...."))
injection attack

 

 

On Tue, Mar 27, 2012 at 12:30 PM, Matthew Kaufman <mkfmncom at gmail.com>
wrote:

Yeah SoftLayer is a good host.  What was the other dedicated host also, that
was owned by ex-RackSpace, for dedicated?

 

 

you're probably thinking of Slicehost.

 

-- 

David Mintz

http://davidmintz.org/

It ain't over:

http://www.healthcare-now.org/ 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120402/f16bf100/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: find-virus.php
Type: application/octet-stream
Size: 1662 bytes
Desc: not available
URL: <http://lists.nyphp.org/pipermail/talk/attachments/20120402/f16bf100/attachment.obj>


More information about the talk mailing list