[Owasp-delhi] Fwd: Fackbook Password Disclosure - Vulnerability

Chintan Dave davechintan at gmail.com
Thu Nov 18 03:20:54 EST 2010


Or is it social engineering to entice security professionals, thinking they
might not understand whats happening? :P

Wait a minute..... Should this be tried here? May be not!

On Thu, Nov 18, 2010 at 12:43 PM, Muslim Koser <mkoser at isightpartners.com>wrote:

>  Hi Komal,
>
> Have you tested this before posting on the list ? I found this to be a
> possible malware dropper.
>
> There are two suspicious files in the /data folder which write in to remote
> process memory.
> /data/app.exe and /data/dummy.exe
>
>
> Best Regards,
> Muslim
>
> On 17/11/10 10:47 PM, "Komal Taneja - DHL Delhi" <komal.dhl.1665 at gmail.com>
> wrote:
>
>
> Facebook recently launched its email and it created a vulnerability ,
>
> Malicous user can change the passowrd of victim.
>
> Download the POC tool and tutorial from
> http://www.mediafire.com/?9xllotl0n4nla6f , Hurry before facebook fix the
> gap.
>
> Komal
>
>
> ------------------------------
> _______________________________________________
> Owasp-delhi mailing list
> Owasp-delhi at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-delhi
>
>
> _______________________________________________
> Owasp-delhi mailing list
> Owasp-delhi at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-delhi
>
>


-- 
Regards,
Chintan Dave,

LinkedIn: http://in.linkedin.com/in/chintandave
Blog:http://www.chintandave.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-delhi/attachments/20101118/66b3cddf/attachment.html 


More information about the Owasp-delhi mailing list