Sign in to follow this  
Followers 0

Simple Investigation of Remote-File-Include Attempts

1 post in this topic

I noticed a few attempts in my logs at attacking my site, where the source scanned for some RFI vulnerabilities (and did so very poorly). I decided to use it as an example for my readers, to see how a few simple techniques can be applied to take a few simple log entries and build up a reasonable profile of the attack and attackers. I have a short writeup and I have posted it to my site:

I figured this would be of interest to at least a handful of people here.


Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
Followers 0