|
Full Disclosure
mailing list archives
Re: sandboxed browsing
From: Pablo Ximenes <pablo () ximen es>
Date: Wed, 1 Aug 2012 10:16:55 -0300
Christian´s tip on wget is a good alternative. Why not do some protocol
level inspection? I mean wget, netcat, curl, etc... Sometimes I even hide
my network with tor. Of course, sometimes you gonna need some actual end
user experience to better analyze the attack, but I think most suspicious
URLs can be cracked right away with just that.
Regards,
Pablo Ximenes
On Wed, Aug 1, 2012 at 7:45 AM, Christian Sciberras <uuf6429 () gmail com>wrote:
I use Internet Explorer 6 on Windows XP, obviously!
On a more serious note, I doubt there's a safer alternative,
except maybe not going there in the first place (or just wget-ing it
instead).
On Wed, Aug 1, 2012 at 1:38 AM, Kyle Creyts <kyle.creyts () gmail com> wrote:
Who uses something other than a browser in a virtual machine to follow
suspicious/possibly malicious links?
If you do, what do you use, and how did you choose it?
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|