lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 11 Dec 2006 10:53:30 -0500 (EST)
From: robert@...appsec.org
To: bugtraq@...urityfocus.com
Subject: WASC-Announcement: MX Injection - Capturing and Exploiting Hidden Mail Servers By Vicente Aguilera Diaz

The Web Application Security Consortium is proud to present 'MX Injection: Capturing and Exploiting 
Hidden Mail Servers' written by Vicente Aguilera Diaz of Internet Security Auditors. In this article 
Vicente discusses how an attacker can inject additional commands into an online web mail application 
communicating with an IMAP/SMTP server. 


This document can be found at http://www.webappsec.org/projects/articles/ .

Regards,

- Robert Auger

articles_at_webappsec.org
http://www.webappsec.org

------------------------------------------------------------------------------------
Are you interested in writing a 'Guest Article' for the WASC? Additional information
on article guidelines may be found at http://www.webappsec.org/articles/. Inquires
can be sent to articles_at_webappsec.org

"Contributed articles may include industry best practices, technical information about
current issues, innovative defense techniques, etc. NO VENDOR PITCHES OR MARKETING
GIMMICKS PLEASE. We are only soliciting concrete information from the experts on the
front lines of the web application security field."
<a href="http://www.webappsec.org">http://www.webappsec.org</a>
------------------------------------------------------------------------------------

Powered by blists - more mailing lists