On Wed, Jun 16, 2004 at 01:26:28PM +0200, R Armiento wrote:...For example: attacker 'A' sends 'B' a social engineering request for "the secret plans"
spam filter silently drops the email. 'A' forges a reply
it's not a "real" vulnerability that gives remote root to the attacker, I think it's beautiful though. :)
Director of Forensic Services PivX Solutions, Inc. http://www.pivx.com