Real Cases
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Re: Re: Looking for information on logs from Mambo or Joomla Aug 24 2006 09:36AM
eaxc eax co za
Hi there,

I studied the mambo attack for a while!

The big problem with the source the attackers use is that one hacker can hack a site from another hacker using the same scripts!

i.e. if i successfully compromise a site and it is under my control another attacker would be able to take cont...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus