User: Password:
|
|
Subscribe / Log in / New account

Cryptographic splicing makes for a Wordpress vulnerability

Cryptographic splicing makes for a Wordpress vulnerability

Posted May 8, 2008 21:35 UTC (Thu) by martinfick (subscriber, #4455)
In reply to: Cryptographic splicing makes for a Wordpress vulnerability by bronson
Parent article: Cryptographic splicing makes for a Wordpress vulnerability

Also, with mozilla you can simply insert a new username@ after the ":" of your protocol like
this "http://bogus@site.com" and it will then proceed to prompt you for a username & password.
Now you can enter your original username and a bogus password which it will now remember.
Yes, this is a hack, but it will do what you want.  There may be a better method, but that is
what I came up with quickly.  I was surprised that it was not stored under the password tab in
the options menus.


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds