On Tue, 08 Jun 2004 11:24:49 PDT, Gregory Hicks said:
Isn't this called a "dictionary" attack?
Well... if you want to get technical, it's a subclass of dictionary attack -
the only question being how the dictionary is created.
The specific term you are looking for, I believe is "Directory Harvest
On Tue, 08 Jun 2004 11:24:49 PDT, Gregory Hicks said:
> Isn't this called a "dictionary" attack?
Well... if you want to get technical, it's a subclass of dictionary attack -
the only question being how the dictionary is created. In this case, it's a
mix-and-match scheme of data. Other "dictionar
Isn't this called a "dictionary" attack?
> To: Adi Linden <[EMAIL PROTECTED]>
> Cc: [EMAIL PROTECTED]
> Subject: Re: Addresses for latest spam
> From: [EMAIL PROTECTED]
> Date: Tue, 08 Jun 2004 11:44:50 -0400
>
> On Tue, 08 Jun 2004 09:06:35
On Tue, 08 Jun 2004 09:06:35 CDT, Adi Linden <[EMAIL PROTECTED]> said:
>
> Does anyone know how the latest email worms assemble the email addresses
> they use? I am getting a large amount of junk destined for non-existant
> (never existant) email accounts. So the address cannot be taken from th
Does anyone know how the latest email worms assemble the email addresses
they use? I am getting a large amount of junk destined for non-existant
(never existant) email accounts. So the address cannot be taken from the
various address books on the compromised PC's.
Adi