Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<html>
<head>
<title>Hacked By Neon-Lenz - Grey-Hat Project</title>
</head>
<!-- Hacked By Neon-Lenz -->
<!-- Grey-Hat Project -->
<!-- My Watermark -->
<body text="#CCCCCC" bgcolor="#000000" link="#33FF33" vlink="#33FF33" alink="#33FF33">
&nbsp;
<br><font size=+4><b><font color="#33FF33">H</font></b>acked <b><font color="#33FF33">B</font></b>y
<b><font color="#33FF33">N</font></b>eon-Lenz</font>
<p><font size=+1><b><font color="#33FF33">T</font></b><font color="#CCCCCC">o</font><font color="#33FF33">
<b>A</b></font><font color="#CCCCCC">dmin</font><font color="#33FF33">:</font></font>
<br>I've removed the logs to erase my own presence. I haven't checked your
other directories
<br>nor have i deleted anything from your harddisk. I haven't planted any
backdoors or stolen
<br>any data from your harddisk. My purpose was to warn you and other potential
administrators
<br>who are reading this defacement on any of the hacked archive mirrors
that their webservers
<br>are potential to some known web-vulnerabilities which can lead to a
hack/defacement. Your
<br>default.htm has been backed up as default.bak. It can be access right
<a href="default.bak">here</a>. If you need more
assistance
<br>into fixing your webserver, then you can contact me at the following
e-mail address : <a href="mailto:neonlenz@hushmail.com">neonlenz@hushmail.com</a>
<p><b><font size=+2><font color="#33FF33">A</font> <font color="#33FF33">G</font>rey-Hat
<font color="#33FF33">C</font>ontribution this time:</font></b>
<br><b><font size=+2>----------------------------------------------</font></b>
<p><font size=+1><font color="#33FF33">A</font> <font color="#33FF33">s</font>mall
<font color="#33FF33">e</font>xplanation<font color="#33FF33">:</font></font>
<br>This site was hacked using an<b> "<font color="#33FF33">I</font>nput
<font color="#33FF33">V</font>alidation <font color="#33FF33">A</font>ttack"</b>.
<br>These kinds of attacks are usually executed by receiving input of external
users.
<br>The input are usually given and received via port 80 which is then
executed by an
<br>ASP/CGI&nbsp; program. Some script (usually samples from a webserver
software) in your public
<br>directory will then progress the input given by the external user.
There are various vulnerabilities
<br>on the web, some of them allow external users to view and download
files where they shouldn't
<br>have access to, some causes webservers to hang and some even allow
external users to give
<br>commands which are going to be executed locally on the remote webserver.
(Able to spawn a C:\)
<p><font size=+1><font color="#33FF33">W</font>hat <font color="#33FF33">y</font>ou
<font color="#33FF33">c</font>an <font color="#33FF33">d</font>o <font color="#33FF33">t</font>o
<font color="#33FF33">p</font>revent <font color="#33FF33">t</font>hat<font color="#33FF33">:</font></font>
<br>Very simple, by removing all the unnecessarily samples and subdirectories
<br>like /cgi-bin in your public directory. If you really have the need
to use the
<br>samples or the subdirectories, then you will need to contact your software
<br>vendor for help or just visit your software vendor's website for official
patches.
<p><font size=+1><font color="#33FF33">P</font>.S. : <font color="#33FF33">S</font>orry
for my poor English.</font>
<p><font size=+1><b>&nbsp;</b>-------------------</font>
<br><font size=+1>&nbsp;<b><font color="#33FF33">S</font></b>HOUTS <b><font color="#33FF33">T</font></b>O:</font>
<br><font size=+1>------------------</font>
<br>/ <b>T</b>ribunal / <b>H</b>erbless / <b>F</b>ux0r / <b>n</b>exus /
<b>G</b>-Force Pakistan / <b>N</b>e[r0 / <b>e</b>lectr0n /
<br>/ <b>d</b>islexik / <b>p</b>r|est / <b>F</b>0kus / <b>Z</b>yvr / <b>A</b>ttrition
/ <b>A</b>lldas / <b>H</b>axordot / <b>u</b>4ia / <b>sl</b>eight /
<br>/ <b>C</b>isco / <b>{</b>} / <b>N</b>ohican / <b>D</b>arkSky / <b>D</b>utch
Hackers / <b>P</b>acketstorm / <b>K</b>eyDet89 /<font size=+1></font>
<p><font size=+1>If you want to send me an e-mail send it to <a href="mailto:neonlenz@hushmail.com">neonlenz@hushmail.com</a></font>
<p><font size=-1>Penetrated By <a href="mailto:neonlenz@hushmail.com">Neon-Lenz
</a>as a grey-hat project to warn insecure webservers.</font>
</body>
</html>
<!-- www.attrition.org web hack mirror - watermark or something -->