[9885] in bugtraq

home help back first fref pref prev next nref lref last post

SMTP Abuse - Extracted domains from glpro.exe application

daemon@ATHENA.MIT.EDU (Frank Miller)
Wed Mar 10 17:17:18 1999

Date: 	Wed, 10 Mar 1999 11:24:30 -0800
Reply-To: Frank Miller <frankm@BEND.OR.US>
From: Frank Miller <frankm@BEND.OR.US>
X-To:         aleph1@underground.org
To: BUGTRAQ@NETSPACE.ORG

Per request, the following URL lists domains hardcoded into the glpro.exe
application (version 3.3 trail).

ftp://ftp.apaynet.com/pub/glpro/glpro.txt

In summary, the glpro.exe application performs, as discussed, a dictionary
based 'attack' upon MTA's (RCPT/MAIL) in order to obtain a list of addresses
for UCE's.  Approximately 4000 + domains (including isi.edu!!) was noted.

Take care,

Frank Miller

home help back first fref pref prev next nref lref last post