Full Disclosure mailing list archives
Re: Fw: Removal of wildcard A records from .com and .net zones
From: Michael Scheidell <scheidell () secnap net>
Date: Sat, 4 Oct 2003 08:08:31 -0400 (EDT)
So that leaves 13 hours to spam VeriSign's data mining basis
with meaningless requests like
while (1) {
($v, $w) = two_random_words_from("/usr/share/dict/words");
system("lynx -source http://$v.$w.net > /dev/null 2>&1");
not sure that is all that nessessary. The spammers are actually helping DDOS verisign. There are a lot of web sites running 'wpoision' which creates random usernames and domain names already, ripe for the email harvesters. See the bottom of http://www.secnap.com/contact.html for the 'Special link for email gathering bots.' spammers are sending email by the bizillions to verisign. Even if verisign is dumping them, that is still bizillions of smtp connects per second. -- Michael Scheidell SECNAP Network Security, LLC Main: 561-368-9561 / www.secnap.net Looking for a career in Internet security? http://www.secnap.net/employment/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: More on Dan Geer J.A. Terranson (Sep 30)
