File Access Bruteforce Attempts for 2021-09-27
Share on:
Sep 27, 2021
Reconnaissance
Last Updated: 22:09 UTC
- %09/example.com/
- %0a/example.com/
- %0d/example.com/
- %5Cexample.com
- %5cexample.com/%2f%2e%2e
- .git/HEAD
- .well-known/
- .well-known/traffic-advice
- ///example.com/%2f%2e%2e
- 1/[email protected]
- CHANGELOG.txt
- HNAP1/
- admin/controller/extension/extension/
- admin/index.php?route=common/login
- app-ads.txt
- apple-touch-icon.png
- csv
- cve-2007-1192/
- example%E3%80%82com
- example.com
- example.com/
- example.com//
- feed
- feeds
- files/
- images/
- phishingdomains-2021-06-08/
- phishingdomains-2021-06-28/
- phishingdomains-2021-09-26/
- phishingdomains-2021-09-27/
- phishingdomains-2021-09-28/
- rss
- sellers.json
- sites/all/libraries/elfinder/src/connectors/php/connector.php
- sites/default/files/
- uploads/
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wordpress/
- wp-admin/css/
- wp-login.php
- xlet.php
- xmlrpc.php