Let's see the source please.

On 3/26/08, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> I've just read the discussion from here, seriously, I don't know what's
> going on.
>
> I've coded it since 2005 and never release it until this year. And I
> really do not know why it be treated as a backdoor.
>
> If you think it is a backdoor, so please do a reverse engineering on it.
> You can capture the network packet, you can list all the strings in it, even
> you can hook APIs in it. Do anything you like to make sure whether it's
> backdoor or not.
>
> BTW, I packeted it through UPX to reduce the size. And some people focused
> on "http://www.nosec.org/web/index.txt";, which is used in ORACLE injection
> mode when the target database is in intranet so we can use some store-procs
> to make the target to visit our website then we can receive the internet
> address that is mapped to outside. Anybody who is good at oracle injection
> should know this.
>
> Really, I wanna know why!!!
>
>  < div class="w134">
>
>    ------------------------------
>   
> 2008年薪水翻倍技巧<http://doc.go.sohu.com/200802/5e1b674ab8183f3db8baba8ee4c6dd53.php>
> *用搜狗拼音写邮件,体验更流畅的中文输入>><http://goto.mail.sohu.com/goto.php3?code=mailadt-ta>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to