• Here is an example of what I am seeing when this url is accessed (stripped my real domain and the post name, this is just an example with the real “user name/password” that I am assuming is part of a shell?
    http://www.mydomain.com/postname/:ShelaMcCathie:Soec54xSnUcB

    Header is as follows:

    Referer: http://www.mydomain.com/
    Accept-Encoding: gzip, deflate
    Accept-Language: en
    Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/webp, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; MSIE 5.5; Windows NT 5.0) Opera 7.02 Bork-edition [en]
    Connection: Keep-Alive
    Host: www.mydomain.com
    Content-Length:
    Content-Type:

    Does this mean someone is attempting some cross scripting with Bad Behavior, or another plugin maybe, that Bad Behavior is picking up. Anyone have any tips on seeing if there is a user related to the string in the url? Thanks.

    https://wordpress.org/plugins/bad-behavior/

  • The topic ‘Bad Behavior picking up odd behavior’ is closed to new replies.