lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3a166c090603311522g76bb83c3xd537560c382c0e04@mail.gmail.com>
Date: Sat Apr  1 00:22:29 2006
From: n3td3v at gmail.com (n3td3v)
Subject: Re: RSA HAVE CRACKED PHISHING, NO SERIOUSLY

Well, Chris, it looks to me by the RSA publishing this information that they
are encouraging anyone with a botnet to send thousands of bogus queries to a
web form, which would crash a mail server or database, which belonged to a
company, that the phishers had previously hacked and the company was
previously unaware was being used in a phishing attempt. So now it seems the
RSA are sending out information about their activities, which could
infulence scriptkids/ hackers etc who own large bot nets to attack anything
they see as a "phish". Although, just by individuals of the public sending a
single query per user to a phish login form, could cause the same affect as
a malicious users bot network.

On 4/1/06, Chris Umphress <umphress@...il.com> wrote:
>
> On 3/31/06, n3td3v <n3td3v@...il.com> wrote:
> > With this in mind, are the RSA say its OK to DDoS fake login pages that
> the
> > public think are phishing sites with fake information to take the
> phishing
> > sites down? Or maybe the RSA didn't think too far into it before making
> > their "illegal tactics" public. I guess nobody in the industry learned
> from
> > makelovenotspam.com and the whole Lycos affair.
> >
> > On 3/31/06, n3td3v <n3td3v@...il.com> wrote:
> > >
> > > But do you remmeber back to the Make love not spam saga? Yeah, the big
>
> So.... why repeat yourself 15 minutes later? And personally, I like
> the fate that one spammer in Russia met a few months ago....
>
> --
> Chris Umphress <http://daga.dyndns.org/>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060401/bdc718cd/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ