[03:18:00] [1/2] https://utau.wiki/wiki/Special:Contributions/2A03:CFC0:8000:26:0:0:C303:DED4 [03:18:01] [2/2] Penetration testing? [06:35:37] seems more like some skid trying to sql inject mediawiki [06:36:35] mediawiki is very robust, I'm sure an exploit probably exists because one does in everything but it's basically watertight [11:35:07] last occurrence of ^ got a special tech slam, cc @rhinosf1 if another is suitable [11:42:35] It looked like a bunch of nonsense pages. [11:43:43] It's what zipee alr explained but it's basically a bizarre attempt of hacking, either for nefarious reasons or for "just trying to see if it works" reasons [11:44:50] script kiddies gotta script kiddie [11:46:23] Ostensibly having your MAC address blocked is funny tho ngl [11:49:01] Well either way, it looked absolutely bizarre. [11:59:13] It is a rather bizarre case in this regard. [12:00:33] Hoping it was just a well-meaning but misguided individual who didn't know they should have just set up a MediaWiki Docker [14:10:41] I will look later [17:29:02] unlikely [17:29:17] chances are because it was on a custom domain they didn't think it was connected to mh [17:29:57] mind you theoretically a compromise of a random db* server shouldn't really matter as much compared to something like db192 which has mhglobal and all the stuff that can cause damage like meta, it's still not great but [18:19:19] Oof... That sounds bad if you really think about it. [18:20:15] ehh there could be worse [18:20:34] I mean realistically any compromise could probably be exploited to privilege escalate quite high but [18:21:15] But what? [18:21:25] the guy seemed like a skid