Point of order: To be a honeypot the vulnerability would have 
to be on a system that served no other purpose, despite what 
ISS would have you believe.
 
Cory Altheide
Computer Forensics Specialist
NNSA Cyber Forensics Center
[EMAIL PROTECTED]
 
> > -----Original Message-----
> > From: Myers, Marvin [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, July 24, 2003 11:44 AM
> > To: Jennifer Bradley; [EMAIL PROTECTED]
> > Subject: RE: Re: [Full-Disclosure] morning_wood should stop 
> > posting xss
> > 
> > 
> > Jennifer,
> >    Did you ever think that there is even the slightest
> > possibility that the wood has done this on purpose? Have you 
> > never heard of a honey-pot. Some people in this world do have 
> > the ability to learn by observing others. So now I guess you 
> > are calling all of the honey-pot and honey-net operators 
> > moron's. Did you hear that Lance??

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to