RT @ErrataRob: are there other vectors for POODLE that aren't man-in-the-middle? <- Says the man with the mega scanner, salivating.
-
-
@attritionorg@thedarktangent how would a non-man-in-the-middle attack work? -
@ErrataRob@thedarktangent the#POODLE hash tag has been enlightening. -
@attritionorg@thedarktangent I can't find any describing how to exploit this without MitM -
@ErrataRob@attritionorg@thedarktangent ?? talk to a first year web app tester jesus it is easy to mass scan to determine vuln servers!
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.