Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

How Hackers Identify Their Targets 95

narramissic writes "In a recent article, security guru Brent Huston writes about research he did to get inside the minds of spammers and expose some of the processes they use to identify potential targets. Huston says that among the four common ways that spam is spread, the most common method that spammers use is via open relays. Huston's research also revealed that 'they were doing much more server analysis' than he had expected and that they take a multi-step approach: 'They scan the server for proper RFC compliance, and then they send a test message to a disposable address. Only after these are complete did they adopt the tool to dump their spam.'"
This discussion has been archived. No new comments can be posted.

How Hackers Identify Their Targets

Comments Filter:
  • by Anonymous Coward on Friday September 15, 2006 @05:08PM (#16116821)

    1) Look for SSID "Linksys"

    2) Connect
    3) ????
    4)> Profit!

  • by $RANDOMLUSER ( 804576 ) on Friday September 15, 2006 @05:13PM (#16116855)
    ...for getting into the minds of spammers is a couple rounds of semi-jacketed .357 hollow-points.
  • by Tackhead ( 54550 ) on Friday September 15, 2006 @05:21PM (#16116922)
    > ...for getting into the minds of spammers is a couple rounds of semi-jacketed .357 hollow-points.

    *BLAM!*

    You have received this delivery of copper and lead because you or a friend subscribed you to the "Bullet of the Week" list.

    To opt out of "Bullet of the Week", please have each spammer in your MLM's downline submit the following form in triplicate, including at least one of their own fingerprints, as well as one of your fingerprints, dipped in the bloody goo from your still-steaming remains.

    Your security and privacy are important to us, so please allow 6-8 weeks for us to conduct the proper forensic analysis to verify the identity of your downline member before we can remove you from our "Bullet of the Week" list.

    NOTE TO DOWNLINE MEMBERS: Pay no attention to the fact that the middle of the three forms includes the verbiage "By placing my bloody fingerprint on this form, I hereby opt in to the Bullet of the Week mailing list".

  • by Anonymous Coward on Friday September 15, 2006 @05:34PM (#16117039)
    I'm a hacker. I choose my target by seeing some new device or system that does something at least kinda cool. Then I say "I bet I can make it do something else cool." Then I do it.

    That, of course, before the star trek rerun and while celebrating the third aniversary of the day a woman let you touch her...
  • by Hamilton Lovecraft ( 993413 ) on Friday September 15, 2006 @06:01PM (#16117229)
    Editor and author both meant "Nazi Islamofascists".
  • by maelstrom ( 638 ) on Friday September 15, 2006 @06:29PM (#16117400) Homepage Journal
    STFU and go home. If Slashdot is only left with arrogant pricks that calls everyone "peasants", I really don't want to be here anymore. I could just as easily make the same argument about you, Slashdot was even better before the six digit noobs got here. Let's cut off all the peasants who have > 4 digits in their UI.

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...