lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <F7CA4410-ED52-11D7-891E-000A95864792@joshie.com>
From: jlevitsk at joshie.com (Joshua Levitsky)
Subject: VeriSign's fake SMTP server for SiteFinder


On Sep 22, 2003, at 6:02 PM, Joshua Thomas wrote:

> > But why they wait until the DATA command is a total mystery to me. It
> > seems much more logical to bounce the message after the RCPT TO:
> > command.
>
> <conspiracy theory>
>
> To read our mail?
>
> </conspiracy theory>

They will read our mail when they accept the DATA command and all after 
it. This will happen. You will see.

Right now they take in the address of who you are sending to and who is 
sending. What a wonderful way to collect valid email addresses. First 
the MAIL FROM will be a correct address most of the time. The RCPT TO 
will be wrong 100% of the time, but they could employ scripts with some 
logic to see things like    user@...scpe.com is really 
user@...scape.com and such. Many typos are repeated in the same way by 
many people.

Can't wait for the spam to start flowing from that list of users they 
are collecting. Of course Verisign will protect their customers from 
the spam. That'll be part of the deal with the spammers they sell to.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 1163 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030922/045341e2/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ