Forum Moderators: phranque
=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f
%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f
%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd%00
I know etc/passwd is the place to store the password.
So, is he checking some kind of exploit that may probably able to fetch my password file by this manner?
[edited by: Drastic at 7:12 pm (utc) on Nov. 8, 2003]
[edit reason] fix scroll [/edit]
This is a typical type of path attack.
You should *always* filter the hell out of data coming into your app.
Learn regular expressions and parse for the specific data you are expecting.
Quadrupally so when dealing with filehandles.
--flashback
$k= "0802020501020401054a2b020154212d01050c030d5230150d064c28190208060d";
@r=unpack('C*', pack('H*',$k)); for (1..shift(@r)){$n[$q+= shift(@r)]=1;}
for(@r){if($n[$t]){$_=-$_};$t++;print chr($o+=$_);}#sig-relation.04.20.02