this is old and i find it personally useless/retarded. complete waste if a wardrivers time. if you can give me 5 cases of something like this actually happening, with PROOF, please do. i will then change my mind.
On 3/21/07, Nick Eoannidis <[EMAIL PROTECTED]> wrote: > For those who haven't read about what Ken was saying. > > The technique is called drive by Pharming. It involves crafting a page > hosting malicious JavaScript that takes advantage of default configurations > in home broadband modem/routers. (dlink, Linksys, netcomm etc.) > The basis of this attack is tricking a user into accessing a webpage that > changes the configuration of your modem by using default username and > password credentials. > > The report by the Indiana university is here: > http://www.cs.indiana.edu/pub/techreports/TR641.pdf > > Symantec's noob proof response is here: > http://www.symantec.com/enterprise/security_response/weblog/2007/02/driveby_ > pharming_how_clicking_1.html > > nikon. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
