Penetration Testing mailing list archives
Re: Recent Application Test
From: Sysmin Sys73m47ic <sysmin770 () yahoo com>
Date: Wed, 18 Aug 2004 11:54:46 -0700 (PDT)
During a recent Application pen test I came across a url of the form:
http://www.vulnsite.com/cgi-bin/vulnscript.jsp?url=www.website.com&id=12345 I have actually seen a lot of spyware that use this technique. They will hijack the browser and run the client through their own machines, so if you try to go to Google you get their search engine instead. Although what you explain doesn't sound like the typical browser hijack, especially if it was just forwarding your traffic and didn't change your ip address. ===== -SySmin Sys73m47ic Development Team {Fu-King Linux} __________________________________ Do you Yahoo!? New and Improved Yahoo! Mail - Send 10MB messages! http://promotions.yahoo.com/new_mail ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.securityfocus.com/sponsor/InfoSecInstitute_pen-test_040817 -------------------------------------------------------------------------------
Current thread:
- Recent Application Test ramatkal (Aug 18)
- Re: Recent Application Test Jon McClintock (Aug 18)
- Re: Recent Application Test Sysmin Sys73m47ic (Aug 18)
- Re: Recent Application Test K. K. Mookhey (Aug 19)
- Re: Recent Application Test Ben Timby (Aug 19)
- Re: Recent Application Test Ivan Krstic (Aug 19)