|
Posted by Jerry Stuckle on 04/29/06 17:52
Martin Jay wrote:
> In message <o86dnYXPebLANc_ZnZ2dnUVZ_s-dnZ2d@comcast.com>, Jerry Stuckle
> <jstucklex@attglobal.net> writes
>
>> Martin Jay wrote:
>>
>>> I (think) I understand the principle, but I cannot replicate it.
>>> The 'hack' seems to rely on email being routed by the 'to,' 'cc,'
>>> and 'bcc' fields in its header, which is isn't. Well, not until it
>>> reaches its destination, maybe.
>
>
>>> I emailed Paul an example script earlier. I've also uploaded it to:
>>> <http://www.spam-free.org.uk/pages/email_test.php>.
>
>
>>> I would be interested to see how the spamming technique you mention
>>> can be used with it. I have changed the form method from POST to
>>> GET to make it easier to 'hack.'
>
>
>> Either way. I just make a local copy of your form, edit it to add the
>> headers I want, and post it back to you. For instance, I place in the
>> subject field:
>>
>> This is spam
>> bcc: someone@example.com
>>
>> And off it goes. The more fields I add, the more I'm sending.
>>
>> Not hard at all.
>
>
> Hmmm...
>
> I've replaced the page I mentioned earlier with one that allows you to
> download a copy of the form script.
>
> Put it on your local server and try your theory out.
>
> I cannot replicate the problem you highlighted. :(
Martin,
Sorry, I have too many other things to do than to download scripts and test them
on my server. I gave you the references and some suggestions. I really don't
wish to spend the time "proving to you I'm right".
--
==================
Remove the "x" from my email address
Jerry Stuckle
JDS Computer Training Corp.
jstucklex@attglobal.net
==================
Navigation:
[Reply to this message]
|