lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403060327.i263RFP06456@netsys.com> From: p.nolan at comcast.net (Patrick Nolan) Subject: [inbox] Re: Re: E-Mail viruses > Valdis.Kletnieks@...edu > > On Fri, 05 Mar 2004 13:36:10 CST, Curt Purdy said: > > > ... Legitimate senders would rename the file, be it > > .exe .doc .jpg, indicate in the body of the message what the true > > extension is, and the receiver merely renames it... > > So let's see.. the same bozos who read the text part of the > virus, get the password, and use that to unzip the rest of > the virus won't read the text part, get the rename to do, and..... I was thinking a similar thought -- it's just the same bypass; renaming the extension as using other text in the body to extract the attachment. In a good scenario, the recipient checks with the sender via phone to verify what was sent. Regards, Patrick Nolan
Powered by blists - more mailing lists