Aedating4 Free naughty mobile chat sites

bathroom-blowjob

^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g++ command attempt Sec Rule REQUEST_LINE "/usr/bin/g\+\+" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g++ command attempt Sec Rule REQUEST_LINE "g\+\+\x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}|[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls%20-l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl%20/tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\? ^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g++ command attempt Sec Rule REQUEST_LINE "/usr/bin/g\+\+" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g++ command attempt Sec Rule REQUEST_LINE "g\+\+\x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}|[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls%20-l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl%20/tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\? #Sec Rule REQUEST_LINE "perl" chain #Sec Rule REQUEST_LINE "\x20[a-za-z0-9/]" # WEB-MISC /~root access Sec Rule REQUEST_URI "/~root" # WEB-MISC /~ftp access Sec Rule REQUEST_URI "/~ftp" # WEB-MISC /~nobody access Sec Rule REQUEST_URI "/~nobody" # WEB-MISC Apache Chunked-Encoding worm attempt Sec Rule REQUEST_LINE "ccccccc\: aaaaaaaaaaaaaaaaaaa" # Web-attacks chdir Sec Rule REQUEST_URI "&(cmd|command)=chdir\x20" # Download Sec Rule REQUEST_LINE "wget\x20" Sec Rule REQUEST_LINE "curl\x20" Sec Rule REQUEST_LINE "lynx\x20" Sec Rule REQUEST_LINE "lwp-download\x20" # Bcc Spamming Sec Rule REQUEST_BODY "\s*(b|b)cc\:" #Email Injection Sec Rule ARGS "\n

^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g++ command attempt Sec Rule REQUEST_LINE "/usr/bin/g\+\+" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g++ command attempt Sec Rule REQUEST_LINE "g\+\+\x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}|[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls%20-l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl%20/tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\? ^$" #deny TRACE method Sec Rule REQUEST_METHOD "trace" #Don't accept chunked encodings #modsecurity can not look at these, so this is a hole #that can bypass your rules, the rule before this one #should cover this, but hey paranoia is cheap Sec Rule HTTP_Transfer-Encoding "chunked" # Custome Rules start here #generic recursion signature #Sec Rule REQUEST_LINE "\.\./\.\./" # WEB-ATTACKS uname -a command attempt Sec Rule REQUEST_LINE "uname" chain Sec Rule REQUEST_LINE "\x20-a" # WEB-ATTACKS /bin/ps command attempt Sec Rule REQUEST_LINE "/bin/ps" # WEB-ATTACKS /usr/bin/id command attempt Sec Rule REQUEST_LINE "/usr/bin/id" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS echo command attempt Sec Rule REQUEST_LINE "/bin/echo" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS kill command attempt Sec Rule REQUEST_LINE "/bin/kill" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chmod command attempt Sec Rule REQUEST_LINE "/bin/chmod" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS chsh command attempt Sec Rule REQUEST_LINE "/usr/bin/chsh" # WEB-ATTACKS gcc command attempt Sec Rule REQUEST_LINE "gcc" chain Sec Rule REQUEST_LINE "x20-o" # WEB-ATTACKS /usr/bin/cc command attempt Sec Rule REQUEST_LINE "/usr/bin/cc" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /usr/bin/cpp command attempt Sec Rule REQUEST_LINE "/usr/bin/cpp" chain # WEB-ATTACKS /usr/bin/g++ command attempt Sec Rule REQUEST_LINE "/usr/bin/g\+\+" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS g++ command attempt Sec Rule REQUEST_LINE "g\+\+\x20" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS bin/python access attempt Sec Rule REQUEST_LINE "bin/python" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS python access attempt #Sec Rule REQUEST_LINE "python\x20" # WEB-ATTACKS bin/tclsh execution attempt Sec Rule REQUEST_LINE "bin/tclsh" # WEB-ATTACKS tclsh execution attempt Sec Rule REQUEST_LINE "tclsh8\x20" # WEB-ATTACKS bin/nasm command attempt Sec Rule REQUEST_LINE "bin/nasm" # WEB-ATTACKS nasm command attempt Sec Rule REQUEST_LINE "nasm\x20" # WEB-ATTACKS /usr/bin/perl execution attempt Sec Rule REQUEST_LINE "/usr/bin/perl" # WEB-ATTACKS traceroute command attempt Sec Rule REQUEST_LINE "traceroute" chain Sec Rule REQUEST_LINE "\x20([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}|[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)" # WEB-ATTACKS ping command attempt Sec Rule REQUEST_LINE "/bin/ping" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS mail command attempt Sec Rule REQUEST_LINE "/bin/mail" chain Sec Rule REQUEST_LINE "\x20" # WEB-ATTACKS /bin/ls command attempt Sec Rule REQUEST_LINE "/bin/ls" chain Sec Rule REQUEST_LINE "\x20" # WEB-MISC /etc/passwd access Sec Rule REQUEST_URI "/etc/passwd" # WEB-MISC ls%20-l Sec Rule REQUEST_LINE "ls" chain Sec Rule REQUEST_LINE "\x20-l" # cd /tmp , /var/tmp , /dev/shm Sec Rule REQUEST_LINE "cd\x20/(tmp|var/tmp|dev/shm)" # WEB-MISC perl%20/tmp/*etc.. " Sec Rule REQUEST_LINE "/lila\.(gif|jpg|txt|bmp)\?

#Sec Rule REQUEST_LINE "perl" chain #Sec Rule REQUEST_LINE "\x20[a-za-z0-9/]" # WEB-MISC /~root access Sec Rule REQUEST_URI "/~root" # WEB-MISC /~ftp access Sec Rule REQUEST_URI "/~ftp" # WEB-MISC /~nobody access Sec Rule REQUEST_URI "/~nobody" # WEB-MISC Apache Chunked-Encoding worm attempt Sec Rule REQUEST_LINE "ccccccc\: aaaaaaaaaaaaaaaaaaa" # Web-attacks chdir Sec Rule REQUEST_URI "&(cmd|command)=chdir\x20" # Download Sec Rule REQUEST_LINE "wget\x20" Sec Rule REQUEST_LINE "curl\x20" Sec Rule REQUEST_LINE "lynx\x20" Sec Rule REQUEST_LINE "lwp-download\x20" # Bcc Spamming Sec Rule REQUEST_BODY "\s*(b|b)cc\:" #Email Injection Sec Rule ARGS "\n:space:*(to|bcc|cc):space:*:.*@" #################################### # FRONTPAGE #################################### Sec Rule REQUEST_LINE "_vti_bin" allow Sec Rule REQUEST_LINE "/fpsrvadm\.exe" pass Sec Rule REQUEST_LINE "/fpremadm\.exe" pass Sec Rule REQUEST_LINE "/admisapi/fpadmin\.htm" pass Sec Rule REQUEST_LINE "/scripts/fpadmcgi\.exe" pass Sec Rule REQUEST_LINE "/_private/orders\.txt" pass Sec Rule REQUEST_LINE "/_private/form_results\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.htm" pass Sec Rule REQUEST_LINE "/cfgwiz\.exe" pass Sec Rule REQUEST_LINE "/authors\.pwd" pass Sec Rule REQUEST_LINE "/_vti_bin/_vti_aut/author\.exe" pass Sec Rule REQUEST_LINE "/administrators\.pwd" pass Sec Rule REQUEST_LINE "/_private/form_results\.htm" pass Sec Rule REQUEST_LINE "/_vti_pvt/access\.cnf" pass Sec Rule REQUEST_LINE "/_private/register\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.txt" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.cnf" pass Sec Rule REQUEST_LINE "/service\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.stp" pass Sec Rule REQUEST_LINE "/_vti_pvt/services\.cnf" pass Sec Rule REQUEST_LINE "/_vti_bin/shtml\.exe" pass Sec Rule REQUEST_LINE "/_vti_pvt/svcacl\.cnf" pass Sec Rule REQUEST_LINE "/users\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/writeto\.cnf" pass Sec Rule REQUEST_LINE "/dvwssr\.dll" pass Sec Rule REQUEST_LINE "/_private/register\.htm" pass Sec Rule REQUEST_LINE "/_vti_bin/" pass ########################################### #Double pipe exclusion rules ########################################### Sec Rule REQUEST_LINE "/cse\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/nmap\.(gif|jpg|txt|bmp)\? #Sec Rule REQUEST_LINE "perl" chain #Sec Rule REQUEST_LINE "\x20[a-za-z0-9/]" # WEB-MISC /~root access Sec Rule REQUEST_URI "/~root" # WEB-MISC /~ftp access Sec Rule REQUEST_URI "/~ftp" # WEB-MISC /~nobody access Sec Rule REQUEST_URI "/~nobody" # WEB-MISC Apache Chunked-Encoding worm attempt Sec Rule REQUEST_LINE "ccccccc\: aaaaaaaaaaaaaaaaaaa" # Web-attacks chdir Sec Rule REQUEST_URI "&(cmd|command)=chdir\x20" # Download Sec Rule REQUEST_LINE "wget\x20" Sec Rule REQUEST_LINE "curl\x20" Sec Rule REQUEST_LINE "lynx\x20" Sec Rule REQUEST_LINE "lwp-download\x20" # Bcc Spamming Sec Rule REQUEST_BODY "\s*(b|b)cc\:" #Email Injection Sec Rule ARGS "\n:space:*(to|bcc|cc):space:*:.*@" #################################### # FRONTPAGE #################################### Sec Rule REQUEST_LINE "_vti_bin" allow Sec Rule REQUEST_LINE "/fpsrvadm\.exe" pass Sec Rule REQUEST_LINE "/fpremadm\.exe" pass Sec Rule REQUEST_LINE "/admisapi/fpadmin\.htm" pass Sec Rule REQUEST_LINE "/scripts/fpadmcgi\.exe" pass Sec Rule REQUEST_LINE "/_private/orders\.txt" pass Sec Rule REQUEST_LINE "/_private/form_results\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.htm" pass Sec Rule REQUEST_LINE "/cfgwiz\.exe" pass Sec Rule REQUEST_LINE "/authors\.pwd" pass Sec Rule REQUEST_LINE "/_vti_bin/_vti_aut/author\.exe" pass Sec Rule REQUEST_LINE "/administrators\.pwd" pass Sec Rule REQUEST_LINE "/_private/form_results\.htm" pass Sec Rule REQUEST_LINE "/_vti_pvt/access\.cnf" pass Sec Rule REQUEST_LINE "/_private/register\.txt" pass Sec Rule REQUEST_LINE "/_private/registrations\.txt" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.cnf" pass Sec Rule REQUEST_LINE "/service\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/service\.stp" pass Sec Rule REQUEST_LINE "/_vti_pvt/services\.cnf" pass Sec Rule REQUEST_LINE "/_vti_bin/shtml\.exe" pass Sec Rule REQUEST_LINE "/_vti_pvt/svcacl\.cnf" pass Sec Rule REQUEST_LINE "/users\.pwd" pass Sec Rule REQUEST_LINE "/_vti_pvt/writeto\.cnf" pass Sec Rule REQUEST_LINE "/dvwssr\.dll" pass Sec Rule REQUEST_LINE "/_private/register\.htm" pass Sec Rule REQUEST_LINE "/_vti_bin/" pass ########################################### #Double pipe exclusion rules ########################################### Sec Rule REQUEST_LINE "/cse\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/nmap\.(gif|jpg|txt|bmp)\?

" Sec Rule REQUEST_LINE "/terminatorx-exp.*\.(gif|jpg|txt|bmp|php)\? " Sec Rule REQUEST_LINE "/\.it/viewde" Sec Rule REQUEST_LINE "/cmd\? &(cmd|command)=" Sec Rule REQUEST_LINE "/pro18\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/shell\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/bash\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/(o|0|p)wn(e|3)d\.(gif|jpg|txt|bmp)\? &(cmd|command)=" Sec Rule REQUEST_LINE "/get\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/root\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/terminatorx-exp.*\.(gif|jpg|txt|bmp|php)\? " Sec Rule REQUEST_LINE "/\.it/viewde" Sec Rule REQUEST_LINE "/cmd\? &(cmd|command)=" Sec Rule REQUEST_LINE "/pro18\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/shell\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/bash\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/(o|0|p)wn(e|3)d\.(gif|jpg|txt|bmp)\? &(cmd|command)=" Sec Rule REQUEST_LINE "/get\.(gif|jpg|txt|bmp)\? " Sec Rule REQUEST_LINE "/root\.(gif|jpg|txt|bmp)\?

&(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\.ns\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.dat\? &(command|cmd)=" Sec Rule REQUEST_LINE "/sep\.txt\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\.ns\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.php\? &(command|cmd)=" Sec Rule REQUEST_LINE "/cmd\.dat\? &(command|cmd)=" Sec Rule REQUEST_LINE "/sep\.txt\?

include= #ACGV News v0.9.1 - Remote File Include Vulnerabilities - ( Sec Rule REQUEST_URI ".*acgvnews\/header\.php\? dir\[inc\]= #My Speach #Cutenews cutepath ( - Sec Rule REQUEST_URI ".*show(_|\s|.|\[)(archives|news)\.php\? include= #ACGV News v0.9.1 - Remote File Include Vulnerabilities - ( Sec Rule REQUEST_URI ".*acgvnews\/header\.php\? dir\[inc\]= #My Speach #Cutenews cutepath ( - Sec Rule REQUEST_URI ".*show(_|\s|.|\[)(archives|news)\.php\?

.*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)simple(_|\s|.|\[)review.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Coppermine Privilege Escalation ( ) - Sec Rule REQUEST_URI ".*delete\.php\? .*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)simple(_|\s|.|\[)review.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Coppermine Privilege Escalation ( ) - Sec Rule REQUEST_URI ".*delete\.php\?

.*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)na(_|\s|.|\[)newsdescription.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_simple_review ( ) - Sec Rule REQUEST_URI ".*index\.php\? .*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)na(_|\s|.|\[)newsdescription.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_simple_review ( ) - Sec Rule REQUEST_URI ".*index\.php\?

bathroom-blowjob

bathroom-blowjob

.*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)phocadocumentation.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_na_newsdescription ( ) - Sec Rule REQUEST_URI ".*index\.php\? .*" chain Sec Rule QUERY_STRING ".*option=com(_|\s|.|\[)phocadocumentation.*" chain Sec Rule QUERY_STRING ".*(union|select|from|where|drop|create|table).*" #Joomla com_na_newsdescription ( ) - Sec Rule REQUEST_URI ".*index\.php\?

.*token=[0-9A-Fa-f]{32}.*" #Script Injection Attack File - Sec Rule REQUEST_URI "copper\.php" #Joomla com_phocadocumentation ( ) - Sec Rule REQUEST_URI ".*index\.php\? .*token=[0-9A-Fa-f]{32}.*" #Script Injection Attack File - Sec Rule REQUEST_URI "copper\.php" #Joomla com_phocadocumentation ( ) - Sec Rule REQUEST_URI ".*index\.php\?

english-premier-league.ru

52 Comments

  1. Pingback:

  2. eric   •  

    I have lived in the Boston metropolitan area for over 10 years and have acquired a minimal ability to reliably transport myself to and from only my most often visited destinations.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>