Hi Everyone,
So it is pretty obvious from a business prospective how users are getting hacked. However, the hackers are able to send out thousands of emails immediately. It seems like they are downloading the GAL, but what method are they using to send out these emails? It seems like an iterative script but what method? Is it using SMTP or a mail rule?
*Please don't downvote me...I've asked 3 IT companies this and it seems like only the hacking community would know this*
[link] [comments]
from hacking: security in practice https://ift.tt/E1LUpDQ
Comments
Post a Comment