Stephen Sprunk wrote:

What this really does is change the detection method.  Instead of scanning
randomly, you sit and watch what other IP addresses the local host
communicates with (on- and off-subnet), and attack each of them.  How many
degrees of separation are there really between any two unrelated computers
on the Internet?  You could probably collect half of all addresses in use
just by infecting Google...
Or just send email with IMG SRC tag pointing to a server you control and harvest the addresses from there?

Pete


Reply via email to