It seems like spammers are now moving to automated spam via popular web mail services as a way to bypass IP-blacklisting services. It’s a large advantage for them as they can still use botnet sources to generate the e-mail but the source IP address will be from a ‘trusted’ domain such as Gmail or Yahoo!. […]
Search results for "yahoo"
I’ve seen this from quite a few sources so it seems it’s fairly legitimate, it seems all major websites have some flaws in the way they implement cookies meaning they are vulnerable to certain types of attack. The only current solution seems to be using full time SSL or https connections full-time, if any of […]
Phishers never give up, password theft protected pages? But what about password protected messenger application… No more to say check it out (lame)… Link :: www.ourgodfather.com Another Yahoo anti-phising (did you know?): zahoo.com (also yahoo, for the ones that have inverted keyboard y-z)
“pleez, pleez, PLEEZ teach me how to do email hacking on a Hotmail Account!!!” -unidentified IRC user From here on in you walk alone. Neither little_v OR Black Sun Research Facility AND its members will be responsible for what you do with the information presented here. Do not use this information to impress your “l33t0_b0rit0” […]
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network for interesting data (passwords, e-mail, files, etc.). ARPspoof, DNSspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement […]
The OWASP Amass Project is a DNS Enumeration, Attack Surface Mapping & External Asset Discovery tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. Information Gathering Techniques Used by OWASP Amass for DNS Enumeration and More The main […]