Forum Moderators: mack

Message Too Old, No Replies

What's it called and how do I translate it? "%5"

Resolving formmail exploits to report the harvesting email addresses.

         

EJHonda

6:54 pm on Feb 10, 2003 (gmt 0)

10+ Year Member



We get people attempting to exploit a formmail script on occasion, and I'd like to be able to translate the input attempt.

For example,

"recipient=big%5Fake03%40yahoo%2Ecom&msg=miSledTM"

shows in our logs. I realize that someone is attempting to execute, or find the existence of a script called formmail.pl, and they are feeding in parms. What I don't know is what is the form of the input called (the parts prefixed with '%'), and where can I find a resource on the web to translate the values?

Any help is greatfully appreciated!

DiAMOndDavE

10:17 pm on Feb 10, 2003 (gmt 0)

10+ Year Member



Check out Matts Script Archives [scriptarchive.com...]
he was the author of the program
HTH
DiAMOndDavE

EJHonda

12:03 am on Feb 11, 2003 (gmt 0)

10+ Year Member



Thanks Dave, but that's not what I'm looking for. I want to know what the format of the input is called - when normal characters are represented by a % sign w/ numbers after it. Once I know what the language is called, then I can look for a reference to translate those attempts to input something into a non-existent formmail.pl script on my web server.

BjarneDM

12:15 am on Feb 11, 2003 (gmt 0)

10+ Year Member



the %xx isn't a language - it's just the hexadecimal encoding of a character

thus %5F = _ ; %40 = @ ; %2E = .

these encodings are often necessary in order for the server!not! to act upon these characters but just decode them instaed and pass them further on to the script itself.

bird

12:24 am on Feb 11, 2003 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



You can look up those hex values in an ASCII table like this one [rt.com].

stevedob

12:40 am on Feb 11, 2003 (gmt 0)

10+ Year Member



You need to be aware that the sender address (which you may be considering reporting) is invariably either a complete fake or a maliciously planted misdirect, and is almost certainly not the actual perpetrator of the attempted exploit anyway.

EJHonda

6:54 pm on Feb 11, 2003 (gmt 0)

10+ Year Member



Hexadecimal encoding - that's the term I couldn't recall!

Correct, the sender address is fake, but the recipient address is usually active, since it is trying to harvest successful probes. I usually send an email out to the address from a free email acct to see if it is still active.

Thanks for the table reference - that's exactly what I was looking for.

Thanks to all for the great responses.