Like my article on extracting Pidgin passwords, this article also deals with extracting passwords from a messenger protocol: AIM. As I mentioned in my article on spreading worm payloads with Bluetooth, one of the most important qualities to pay attention to when coding a worm is how well it can spread. A very common and effective way to spread? Hijacking messengers and sending links and files to all contacts of the victims.
(more…)
Posts Tagged ‘log in’
Local Exploitation: Extracting and Using AIM Passwords
Posted in Code, Local Exploitation, Worms, tagged aim, aol, extract, hash, log in, messenger, passwords, spread on April 15, 2009| Leave a Comment »