ARP MITM attack on your RackSpace Cloud instance and check for yourself; there
are various 'routes' to obscenities of your imagination; lol.
503-881-6906
Sent from my iPhone
On Oct 20, 2011, at 2:10 PM, Chris Snyder wrote:
> On Thu, Oct 20, 2011 at 4:16 PM, Matthew Kaufman wrote:
>>
>> Qui
On Thu, Oct 20, 2011 at 4:16 PM, Matthew Kaufman wrote:
>
> Quite a bit of ways and way too many to list
Yes, exactly.
All of those things we saw back in 2004 that were unbelievably sloppy
are still around. The bad guys are just getting better at finding and
exploiting them. Aided by easy access
Encoding, Javascript, Even over HTTP Headers.
LOL I love this post because Quite a bit of ways and way too many to
list; Daniel I really appreciate this post and your consulting company
looks really great.
On Thu, Oct 20, 2011 at 4:15 PM, Ben Sgro wrote:
> Hello Dan,
>
>> but it'd be good to kno
Hello Dan,
> but it'd be good to know which holes are currently being exploited.
Well of course it would be, but I think we can safely assume it's unpatched
known exploits
in common popular software platforms (wordpress, drupal modules, etc) or 0days
against the same.
We'll see soon enough.
Hi:
http://nakedsecurity.sophos.com/2011/10/19/analysis-of-compromised-web-sites-hacked-php-scripts/
Alas, it only looks at the results of the attack, not how the attacks
are getting through in the first place. Of course, this is how:
https://www.owasp.org/index.php/PHP_Top_5#P1:_Remote_Code_Exe
Started the Capehazeinsider.com html site as a personal travel log collecting
local Florida info I could not find online so that I could look it up reliably
later. Told some friends, put AdSense on it, did some SEO on it, submitted site
maps. Gets some quality organic page 1 search results on th