Hi.
I would like to know what techniques can Intruders use to obtain a lists of hostname and attack them with exploits code?
For example, a huge list like:
www.foo.com
www.bar.com
And so on. Also, they can have a lists with certain criteria in common (os, httpdver) and do a more selective attack. I want to know how they can obtain hostnames asnd create a huge database for potencial host victims?
Thanks in advance.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
