My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it was an attempt to gain Shell access via Local File Inclusion vulnerabilities and injection of malicious code in proc/self/environ. Research lead to the following step-by-step instructions on what was being attempted (listed below).
Category: System Level
Using iTalc on your private home network, you can monitor your kidâ€™s activities and keep an eye on what websites they are browsing, what they are doing on social networking sites like Facebook, and even watch as they read their email. There are other tools that offer similar functions such as keylogging tools and web site blockers, but iTalc is a perfect addition to your arsenal of child protection tools.
Connecting via SSH, requires a user provide his identity to the remote machine using one of several methods. One method lets you access the remote system without entering a password at each login. Normally, when you log in to a system, you authenticate by entering your password for that system. Your password goes, as it is typed, to the remote system, which authenticates it against the /etc/passwd or /etc/shadow file. By contrast, SSH allow a “password-less” authentication method based on public-key cryptography.