Thanks to all who commented on this thread. I had 3 requests to post my
summary, and no complaints (though the 3 days I promised aren't up yet).
Here is what I have to date. Please keep in mind it is intended for the
general public as part of a letter to the editor of our local paper. I left
in som
On Thu, Sep 25, 2003 at 10:39:09PM -0700, Ken Bloom wrote:
>
> On 2003.09.25 21:53, Rob Rogers wrote:
> > On Thu, Sep 25, 2003 at 20:00:51PM -0700, Mitch Patenaude wrote:
> > Sorry. I was thinking back to my earlier email where I was discussing
> > encoding a domain name to look innocuous. Here wa
FWIW I tried to go to the "unencoded" address below and Netscape fails the
DNS lookup, so that browser doesn't do translation.
Also, it looks like somebody has been listening. I tried to go the the
bogus site just now and received a "document not found" in Russian and
English.
- Larry
At 10:39 P
On Thursday, Sep 25, 2003, at 21:53 US/Pacific, Rob Rogers wrote:
Which is quite easy to do, is done frequently via .htaccess, and
doesn't
work in 99.9% of these cases because they're being served off of the
fake webserver, not linked directly from the real one.
I have seen several where the image
On 2003.09.25 21:53, Rob Rogers wrote:
On Thu, Sep 25, 2003 at 20:00:51PM -0700, Mitch Patenaude wrote:
Sorry. I was thinking back to my earlier email where I was discussing
encoding a domain name to look innocuous. Here was my example:
http://www.citibank.com%2e%61%33%6b%73%64%2e%50%69%53%65%4d%2e
On 2003.09.25 21:53, Rob Rogers wrote:
> Again, I still had my previous emails in my head, and was continuing
> from there, making assumptions about things without specifying them.
> I believe we're talking about two very different things here. The
> only Hotmail exploits I've seen have had
On Thu, Sep 25, 2003 at 20:00:51PM -0700, Mitch Patenaude wrote:
> On Thursday, Sep 25, 2003, at 11:23 US/Pacific, Rob Rogers wrote:
> >I see a couple other problems with this idea too. First, this is the
> >first phishing scheme I've seen that loaded the actual homepage. Most
> >just steal their l
On Thursday, Sep 25, 2003, at 11:23 US/Pacific, Rob Rogers wrote:
I see a couple other problems with this idea too. First, this is the
first phishing scheme I've seen that loaded the actual homepage. Most
just steal their logos.
Yes.. that was actually what got me thinking.. when image files
are lo
On Thu, Sep 25, 2003 at 12:26:09PM -0700, Larry Ozeran wrote:
> If there is a preponderance of interest in seeing my summary, I'll
> post it back to this thread.
Consider this my statement of preponderancing. ;)
-bill!
___
vox-tech mailing list
[EMAIL P
Hi all -
This is really interesting and really concerning. I would like to take
selected parts of the discussion (for brevity and clarity) and send it to
my local paper. Please indicate (offline is fine) if you would prefer to be
named or kept anonymous.
If you do not want your comments included,
On Thu, Sep 25, 2003 at 11:04:54AM -0700, Michael J Wenk wrote:
> On Thu, Sep 25, 2003 at 10:23:11AM -0700, Mitch Patenaude wrote:
> > On Thu, Sep 25, 2003 at 06:30:32AM -0700, [EMAIL PROTECTED] wrote:
> > >http://
> > >www.citibank.com:[EMAIL PROTECTED]/3/
> > >?IYTEw
> > >4eVTtbH1w6CpDrT
> >
>
On Thu, Sep 25, 2003 at 10:23:11AM -0700, Mitch Patenaude wrote:
> On Thu, Sep 25, 2003 at 06:30:32AM -0700, [EMAIL PROTECTED] wrote:
> >http://
> >www.citibank.com:[EMAIL PROTECTED]/3/
> >?IYTEw
> >4eVTtbH1w6CpDrT
>
> Maybe a way for places like Citibank, Paypal and other fraud prone sites
> to
On Thu, Sep 25, 2003 at 06:30:32AM -0700, [EMAIL PROTECTED] wrote:
http://
www.citibank.com:[EMAIL PROTECTED]/3/
?IYTEw
4eVTtbH1w6CpDrT
Maybe a way for places like Citibank, Paypal and other fraud prone sites
to help prevent this would be to check the referer, and if it's a
strangely
formed url
13 matches
Mail list logo