Scenario: You find a website that’s compromised, being used to host malicious files/phish people. There’s a shell used by the attackers, still there and doesn’t need auth to use. What do you do?
17% Use shell to clean site
7% Do nothing
50% Only contact site owner
26% Other/show answers
1,799 votes • Final results
28
8
1
26
The CFAA doesn't really have a Good Samaritan clause... to the best of my knowledge.
1
Don’t know the answer, but it isn’t a new problem. link.springer.com/chapter/10…

Oct 9, 2020 · 5:58 AM UTC

1