Real Cases
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Re: Looking for information on logs from Mambo or Joomla Aug 24 2006 09:36AM
eaxc eax co za
Hi there,

I studied the mambo attack for a while!

The big problem with the source the attackers use is that one hacker can hack a site from another hacker using the same scripts!

i.e. if i successfully compromise a site and it is under my control another attacker would be able to take cont...

[ more ]  

Privacy Statement
Copyright 2010, SecurityFocus