- Modal popup with suspicious functions use
- Positive shell recognition ( suspicious functions list with ability to check what kind of function used)
- in case that shell not recognized you can always send it to websecure.co.il and they will inspect the file
- Report with total suspicious and shells files that was found
- extension – extensions that should be scanned
- showlinenumbers – show line number where suspicious function used
- dateformat – used with access time & modified time
- langauge – if I want to use other language
- directory – scan specific directory
- task – perform different task
- report_format – used with is_cron(true) file format for report file
- is_cron – if true run like a cron(no output)
- filelimit – maximum files to scan (more then 30000 you should scan specific directory)
- useget – activate _GET variable for easy way to recive tasks
- authentication – protect script with user & password in case to disable simply set to NULL
- remotefingerprint – get shells signatures db by remote
Number of shells in signature database is: 141
The web is a generative and wild place. Sometimes I think I missed my calling; being devious is so much fun. Too bad my parents brought me up with scruples.
Most phishing attacks depend on an original deception. If you detect that you are at the wrong URL, or that something is amiss on a page, the chase is up. You’ve escaped the attackers. In fact, the time that wary people are most wary is exactly when they first navigate to a site. more>>
The bug was discovered by noted iPhone hacker Charlie Miller, who first talked about the issue at the SyScan conference in Singapore. At the time, he said he’d discovered a way to crash the iPhone via SMS, and that he thought that the crash could ultimately lead to working attack code.
But still the experts say that “iPhone Security: Latest Hack Not So Scary. So time will show 😉
SBerry has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to compromise a user’s system.
Successful exploitation allows execution of arbitrary code.
The vulnerability is confirmed in version 3.5. Other versions may also be affected.
The exploit was released Wednesday online. It attacks a vulnerability present on Windows, Mac and Linux versions of the browser and could be used to surreptitiously execute malware on the machines of users who browse booby-trapped websites.