![]() |
Email In Image Dont Stop Harvesting?
I just put a page up on a domain which is obscure with no traffic, no index and with no inlinks and i put my new email in an image form, the email was on that domain.
next thing, i get a spam to that email. how did the spam read the email address from the image? |
was the email [email protected]
|
yeah the email was in the format of:
[email protected] how the hell did the spam read the email addy off the image? |
They didn't read it.
They auto generate a list for your domain with the most used words (like admin, webmaster, info, contact) |
the best way is to use javascript to delay displaying the image until 1 sec (heck even 1ms) after the page has fully loaded. Of course the script has to pull the email address from a local file/database or else the email would be vivible in the javascript code....
|
Quote:
|
Actually there is some software in the spam market to read emails from images but its almost always wrong and very slow so they likely did a directory attack on your mail server to capture valid emails.
|
I have several domains without any configured email adress that are just registered and not hosted anywhere and I get loads of spam for them. It's sad, but a mail adress in your domain contact information is already enough to start this shit :mad:
|
All times are GMT -7. The time now is 09:17 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123