lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060206134710.18837.qmail@cgisecurity.net>
Date: Mon, 6 Feb 2006 08:47:10 -0500 (EST)
From: contact@...appsec.org
To: bugtraq@...urityfocus.com
Subject: Announcement: Domain Contamination By Amit Klein


The Web Application Security Consortium is proud to present 'Domain Contamination' written 
by Amit Klein. In this article Amit discusses how an attacker who's hijacked a domain for a
short period of time can still retain control of its audience long after the domain is 
returned to its rightful owner.

This document can be found at http://www.webappsec.org/projects/articles/020606.shtml

Regards,

- Robert Auger

articles_at_webappsec.org
http://www.webappsec.org

------------------------------------------------------------------------------------
Are you interested in writing a 'Guest Article' for the WASC? Additional information on 
article guidelines may be found at http://www.webappsec.org/articles/. Inquires can be sent 
to articles_at_webappsec.org

"Contributed articles may include industry best practices, technical information about 
current issues, innovative defense techniques, etc. NO VENDOR PITCHES OR MARKETING GIMMICKS 
PLEASE. We are only soliciting concrete information from the experts on the front lines of 
the web application security field."
<a href="http://www.webappsec.org">http://www.webappsec.org</a>
------------------------------------------------------------------------------------




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ