Full Disclosure mailing list archives
Re: Twitter URL spoofing still exploitable
From: Mario Vilas <mvilas () gmail com>
Date: Tue, 27 Sep 2011 17:00:52 +0200
On Tue, Sep 27, 2011 at 3:26 PM, Dan Kaminsky <dan () doxpara com> wrote:
Ok, now nobody can spoof a URL, but how come a user will tell goodURLs and bad ones apart? Oh boy!Wherever did you get the idea that users can do this?
Jokes apart, I do find it annoying that URLs aren't expanded automatically anymore. But I don't expect this situation to be permanent. -- “There's a reason we separate military and the police: one fights the enemy of the state, the other serves and protects the people. When the military becomes both, then the enemies of the state tend to become the people.”
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Twitter URL spoofing still exploitable Pablo Ximenes (Sep 26)
- Re: Twitter URL spoofing still exploitable Darren Martyn (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Dan Kaminsky (Sep 27)
- Re: Twitter URL spoofing still exploitable Mario Vilas (Sep 27)
- Re: Twitter URL spoofing still exploitable dave bl (Sep 27)
- Re: Twitter URL spoofing still exploitable Benji (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Darren Martyn (Sep 27)