>Hello, > >Is there anybody who is common with the technique described in this article? >http://www.ebcvg.com/articles.php?id=207 >It says something about using Google to target servers by searching >paths to vulnerabilities. > >Any thoughts on that? > >Kind regards, > >
Dunno if this was known to you - I just saw this link for 'Information Disclosure via Google' in Schneier's latest CryptoGram (http://www.schneier.com/crypto-gram-0404.html): http://johnny.ihackstuff.com/index.php?module=prodreviews Good stuff. Very thorough. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
