// Server configuration (e.g. Apache)
'application/x-httpd-php', 'addtype', 'server-info', 'server-status',
+ // Annoying script name
+ 'vuln.php',
+
// @TODO Misc/unsorted
'cgi-', '.eml', '$_request', '$_get', '$request', '$get', '.system',
'&aim', 'new_password', '&icq', '.conf', 'motd ', 'HTTP/1.',
'window.open', 'img src', 'img src', '.jsp', 'servlet', 'org.apache',
'wwwacl', '/servlet/con', 'http_', 'secure_site, ok', 'chunked',
'<script', 'mod_gzip_status', '.system', 'uol.com', ',0x', '(0x',
- 'INSERT_RANDOM_NUMBER_HERE',
+ 'INSERT_RANDOM_NUMBER_HERE', '=passthru',
];
// BLock these words found in User-Agent
// Server configuration (e.g. Apache)
'application/x-httpd-php',
+ // Annoying script name
+ 'vuln.php',
+
// "Common" login names from VHCS exploiters
'starhack', 'DeLiMehmet', 'hisset', 'Hisset', 'delimert', 'MecTruy'
];