lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <41598D42.2090300@crearium.com>
From: fabio at crearium.com (fabio)
Subject: How to obtain hostname lists

Yes. That is the most common technique for worms and mass defacing. But 
there are docs that talk abou t selective mass penetration. For example, 
3 years ago, you could take the list of attrition defaced archive and 
create a list of hostnames with potencial victims.

A tequinique could be to read from a wordlist and then google each works 
and with help of lynx get hostnames. I want to know other choices (smarter).

Thanks for your time.


KF_lists wrote:

> its not hostname based... its IP based.. they use programs to randomly 
> generate IP's.
> -kf
>
>
> fabio wrote:
>
>> Hi.
>>
>> I would like to know what techniques can Intruders use to obtain a 
>> lists of hostname and attack them with exploits code?
>> For example, a huge list like:
>> www.foo.com
>> www.bar.com
>>
>> And so on. Also, they can have a lists with certain criteria in 
>> common (os, httpdver) and do a more selective attack. I want to know 
>> how they can obtain hostnames asnd create a huge database for 
>> potencial host victims?
>>
>> Thanks in advance.
>>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.netsys.com/full-disclosure-charter.html
>>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ