[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <41598D42.2090300@crearium.com>
From: fabio at crearium.com (fabio)
Subject: How to obtain hostname lists
Yes. That is the most common technique for worms and mass defacing. But
there are docs that talk abou t selective mass penetration. For example,
3 years ago, you could take the list of attrition defaced archive and
create a list of hostnames with potencial victims.
A tequinique could be to read from a wordlist and then google each works
and with help of lynx get hostnames. I want to know other choices (smarter).
Thanks for your time.
KF_lists wrote:
> its not hostname based... its IP based.. they use programs to randomly
> generate IP's.
> -kf
>
>
> fabio wrote:
>
>> Hi.
>>
>> I would like to know what techniques can Intruders use to obtain a
>> lists of hostname and attack them with exploits code?
>> For example, a huge list like:
>> www.foo.com
>> www.bar.com
>>
>> And so on. Also, they can have a lists with certain criteria in
>> common (os, httpdver) and do a more selective attack. I want to know
>> how they can obtain hostnames asnd create a huge database for
>> potencial host victims?
>>
>> Thanks in advance.
>>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.netsys.com/full-disclosure-charter.html
>>
>
Powered by blists - more mailing lists