lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BANLkTiniVis621hbec6TT0tfTNkdN7SfaA@mail.gmail.com> Date: Wed, 13 Apr 2011 06:13:28 -0300 From: Javier Bassi <javierbassi@...il.com> To: Cal Leeming <cal@...whisper.co.uk> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Google Search Feature Exploitation Scenario On Tue, Apr 12, 2011 at 6:11 PM, Cal Leeming wrote: > Actually, the filtering seems to be based on the accuracy of the first hit > set. > http://www.google.com/search?q=hacker&btnI - win > http://www.google.com/search?q=hello+hacker&btnI - fail > http://www.google.com/search?q=hello+hack&btnI - win > http://www.google.com/search?q=hello+hac&btnI - fail > http://www.google.com/search?q=hello&btnI - win > See what I mean? satyam was right. It also depends on geographical locations. I got redirected with all those links. I'm feeling lucky (?) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists