Hi.
I would like to know what techniques can Intruders use to obtain a
lists of hostname and attack them with exploits code?
For example, a huge list like:
www.foo.com
www.bar.com
And so on. Also, they can have a lists with certain criteria in
common (os, httpdver) and do a more selective attack. I want to know
how they can obtain hostnames asnd create a huge database for
potencial host victims?
Thanks in advance.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html