How Hackers Identify Their Targets 95
narramissic writes "In a recent article, security guru Brent Huston writes about research he did to get inside the minds of spammers and expose some of the processes they use to identify potential targets. Huston says that among the four common ways that spam is spread, the most common method that spammers use is via open relays. Huston's research also revealed that 'they were doing much more server analysis' than he had expected and that they take a multi-step approach: 'They scan the server for proper RFC compliance, and then they send a test message to a disposable address. Only after these are complete did they adopt the tool to dump their spam.'"
How Hackers Identify Their Targets: (Score:5, Funny)
1) Look for SSID "Linksys"
2) Connect
3) ????
4)> Profit!
My favorite tool... (Score:4, Funny)
Re:My favorite tool... (Score:5, Funny)
*BLAM!*
You have received this delivery of copper and lead because you or a friend subscribed you to the "Bullet of the Week" list.
To opt out of "Bullet of the Week", please have each spammer in your MLM's downline submit the following form in triplicate, including at least one of their own fingerprints, as well as one of your fingerprints, dipped in the bloody goo from your still-steaming remains.
Your security and privacy are important to us, so please allow 6-8 weeks for us to conduct the proper forensic analysis to verify the identity of your downline member before we can remove you from our "Bullet of the Week" list.
NOTE TO DOWNLINE MEMBERS: Pay no attention to the fact that the middle of the three forms includes the verbiage "By placing my bloody fingerprint on this form, I hereby opt in to the Bullet of the Week mailing list".
Re:Hacky Definitions (Score:2, Funny)
That, of course, before the star trek rerun and while celebrating the third aniversary of the day a woman let you touch her...
Re:hacker /= spammer (Score:3, Funny)
Re:Hackers != Spammers (Score:3, Funny)