Shilo exploits a bug in Responder.cgi, a public domain 'C' shell for MacHTTP CGI Servers which contains a buffer overflow that when exploited, will cause the server it is run on to freeze. You are at risk if your responder.cgi file contains the line of code:
char PostArg_Search[256];
which is the QUERY_STRING, Since it only allows upto 256 characters after ?, the server will crash if 257+ characters are requested.
Remove responder.cgi from your /cgi-bin/ or change
char PostArg_Search[256]; to
char PostArg_Search;
Shilo is a simple "hack" written in REALbasic and the source code is available for you to experiment with. I strongly encourage you to attempt to port Shilo to other languages and or other platforms, however, if you do modify the source in any way and re-release to the general public you must
1) Inform me of the New Version "Clone"
2) Include the Source code to the new "Clone"
3) Send me the "Clone" version
Special thanks to the mSec family and all the other gilrs and boys out there keepin' it real on the macintosh scene