Is there anybody who is common with the technique described in this article?
http://www.ebcvg.com/articles.php?id=207
It says something about using Google to target servers by searching paths to vulnerabilities.
Any thoughts on that?
Kind regards,
Aschwin Wesselius
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
