Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Ok, so I got the popcorn ready.... (Score 1) 254 254

I doubt the attackers even went through the hustle to gain root (no need, anyone can start stuff on (unfiltered) 8080). Finding a vulnerable .php/cgi for executing commands on the Server under the uid of the Webserver sounds much easier to me. 1. Scan for vulnerable Servers 2. upload trojansite.tgz 3. unpack to some world-writable/executable directory like for e.g. /tmp/.../ 4. fire up nginx serving the trojans 5. Profit (5 ?! omg, people really have to work for their monies these days)

"Everyone is entitled to an *informed* opinion." -- Harlan Ellison

Working...