Scenario:
You find a website that’s compromised, being used to host malicious files/phish people. There’s a shell used by the attackers, still there and doesn’t need auth to use. What do you do?
17%
Use shell to clean site
7%
Do nothing
50%
Only contact site owner
26%
Other/show answers
1,799 votes • Final results
28
8
1
26
Don’t know the answer, but it isn’t a new problem.
link.springer.com/chapter/10…
Oct 9, 2020 · 5:58 AM UTC
1


