lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <00a001c401da$cec76990$5b00005a@moregarlic.com> From: larry at larryseltzer.com (Larry Seltzer) Subject: Backdoor not recognized by Kaspersky > Another quick workaround to SPF, Caller ID and Domain Keys has alredy > been implemented by spammers for a year or so. The only premise behind > S/C/D is that you are trusted if you have access to a DNS server. > Spammers are using compromised machines not only as SMTP servers, but > also web servers and DNS servers. The end result is that spammers have > already completely circumvented all three solutions way before they > were ever implemented. I'm really not clear how this could work on a DHCP client, which the overwhelming majority of compromised systems must be. Please don't just tell me it's magic and works. What you said in another message about just cracking the storage of credentials in the registry or file system impresses me more and I'm looking into it. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ larryseltzer@...fdavis.com
Powered by blists - more mailing lists