Bugtraq mailing list archives
Re: [Fwd: Re: AIM Password theft]
From: DarkKnight <mbuzz04 () yahoo com>
Date: 24 Sep 2003 18:59:48 -0000
In-Reply-To: <3F7077FE.70303 () uniontown com> That method of stealing was taken from my website, "counter" is used to trick users into thinking that the script is just for a counter, but in reality it is just the object vulnerability. Anyways, AIM will do nothing to fix this. Why? Because it is not a vulnerability within AIM, nor is it really there problem. Prevention- 1. Do not save passwords 2. Delete registry data (only if you use test buddy [staff aim], the passwords are in plain text) 3. Get a firewall 4. Update/Get a Virus Scanner 5. Get an IE patch Do the above and you will be A-Okay, AIM-wise and all around security wise. - DarkKnight (of http://www.insecureonline.com)
Current thread:
- [Fwd: Re: AIM Password theft] Mark Coleman (Sep 23)
- <Possible follow-ups>
- RE: [Fwd: Re: AIM Password theft] S G Masood (Sep 24)
- RE: [Fwd: Re: AIM Password theft] Thor Larholm (Sep 24)
- RE: [Fwd: Re: AIM Password theft] VU#865940 CERT(R) Coordination Center (Sep 24)
- Re: [Fwd: Re: AIM Password theft] DarkKnight (Sep 24)
- Re: [Fwd: Re: AIM Password theft] jelmer (Sep 24)