Just curious..I wouldnt mind dipping into the persons password dump since I see his ***
Edit:
Looks like it tricks the server into thinking the request is from pixel.quantserve.com which allows it to be ran into the pages html...hm..
Results 1 to 8 of 8
Threaded View
- 03 May. 2010 07:59pm #1
So how do people work those *** password image exploits?
Last edited by JustAStupidAsshole; 03 May. 2010 at 08:08pm.