SMTP Abuse - Extracted domains from glpro.exe application

From: Frank Miller (frankmat_private)
Date: Wed Mar 10 1999 - 11:24:30 PST

  • Next message: John D. Hardin: "Re: Linux Blind TCP Spoofing (fwd)"

    Per request, the following URL lists domains hardcoded into the glpro.exe
    application (version 3.3 trail).
    
    ftp://ftp.apaynet.com/pub/glpro/glpro.txt
    
    In summary, the glpro.exe application performs, as discussed, a dictionary
    based 'attack' upon MTA's (RCPT/MAIL) in order to obtain a list of addresses
    for UCE's.  Approximately 4000 + domains (including isi.edu!!) was noted.
    
    Take care,
    
    Frank Miller
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:38:36 PDT