Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

The true power of cache
From: "MustLive" <mustlive () websecurity com ua>
Date: Mon, 8 Feb 2010 01:44:52 +0200

Hello participants of Full-Disclosure!

As I wrote in January in my article The true power of cache
(http://www.webappsec.org/lists/websecurity/archive/2010-02/msg00024.html),
the cache of search engines can be useful tool in skilful hands. There are
many possibilities of using of cache for hackers.

Possibilities of cache of search engines:

1. Search for vulnerabilities of the site in cache.
2. Search for vulnerabilities of the site in snippet.
3. There are no records in the site's logs.
4. Bypassing of restrictions on access to the site.
5. Existence of vulnerabilities in cache.
6. It's always possible to retrieve information from the site.
7. Finding out of the last time, when the site was working.
8. Finding out of the time, when the site was hacked.
9. Malware spreading.

You can read the article The true power of cache at:
http://www.webappsec.org/lists/websecurity/archive/2010-02/msg00024.html

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • The true power of cache MustLive (Feb 08)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault