TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exploiting MySQL arbitrary file read: a honeypot that kicks

67 pointsby marbuabout 6 years ago

4 comments

d33about 6 years ago
&gt; Okay, so what to do with this when I don&#x27;t want to do any harm? I have contacted abuse@ for the given addresses, but unsurprisingly received no reply.<p>shutdown -h now
chxabout 6 years ago
OK this is is fun but can anyone describe a scenario where this is actually dangerous...?
评论 #19306438 未加载
评论 #19306562 未加载
评论 #19307430 未加载
评论 #19306336 未加载
tyingqabout 6 years ago
Retrieving the keys and other interesting bits under ~&#x2F;.ssh might have a higher success rate, and no hash cracking needed.
roywigginsabout 6 years ago
my first thought is, no surprise this is being described by someone with a visibly non-American domain, as this would be a fairly textbook breach of CFAA, right?
评论 #19306470 未加载
评论 #19306582 未加载
评论 #19306488 未加载