<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/styles/rss-style.xsl"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>teodesian.net</title>
<link>http://teodesian.net//posts/598118e7-13f7-11ec-bdd7-da226033170f?format=xml</link>
<description>teodesian.net : /posts/598118e7-13f7-11ec-bdd7-da226033170f</description>
<language>en</language>
<pubDate>2026-04-22T09:05:34</pubDate>
<lastBuildDate>2026-04-22T09:05:34</lastBuildDate>

<image>
<title>teodesian.net</title>
<url>/favicon.ico</url>
<link>http://teodesian.net</link>
<width>32</width>
<height>32</height>
<description>teodesian.net favicon</description>
</image>
<item>
<title>Sounds like Nayana was pretty Negligent</title>
<link>http://teodesian.net/posts/598118e7-13f7-11ec-bdd7-da226033170f</link>
<description><![CDATA[Not very surprising you got ransomware'd when your server was last updated nearly 10 years ago:
<blockquote>
NAYANA’s website runs on Linux kernel 2.6.24.2, which was compiled back in 2008. [...] Additionally, NAYANA’s website uses Apache version 1.3.36 and PHP version 5.1.4, both of which were released back in 2006. Apache vulnerabilities and PHP exploits are well-known;[...]. The version of Apache NAYANA used is run as a user of nobody(uid=99), which indicates that a local exploit may have also been used in the attack.
</blockquote>]]></description>
<author>teo</author>
<guid isPermaLink="true">http://teodesian.net/posts/598118e7-13f7-11ec-bdd7-da226033170f</guid>
<pubDate>2017-06-21T08:56:39</pubDate>
<enclosure url="http://teodesian.net/posts/598118e7-13f7-11ec-bdd7-da226033170f" type="text/html" />
</item>
<item>
<title>Sounds like Nayana was pretty Negligent</title>
<link>http://teodesian.net/posts/1498035399</link>
<description><![CDATA[Not very surprising you got ransomware'd when your server was last updated nearly 10 years ago:
<blockquote>
NAYANA’s website runs on Linux kernel 2.6.24.2, which was compiled back in 2008. [...] Additionally, NAYANA’s website uses Apache version 1.3.36 and PHP version 5.1.4, both of which were released back in 2006. Apache vulnerabilities and PHP exploits are well-known;[...]. The version of Apache NAYANA used is run as a user of nobody(uid=99), which indicates that a local exploit may have also been used in the attack.
</blockquote>]]></description>
<author>teo</author>
<guid isPermaLink="true">http://teodesian.net/posts/1498035399</guid>
<pubDate>2017-06-21T08:56:39</pubDate>
<enclosure type="text/html" url="http://teodesian.net/posts/1498035399" />
</item>
</channel>
</rss>
