
These are a couple of the many tricks that we can use when performing
what I call tracksploitation against phishers and other cyber-criminals. Brought up
in the previous chapter was the fact that the A-311 PHP reader has a bug in the
hexadecimal converter function as well, allowing cross-site scripting.This could
make room for an interactive Web bug trick to get more information about the
attackers, including IP addresses behind proxies and even what sites they fre-
quently visited. Fortunately, and unfortunately, the law requires a balance, so my
ideas of what should be done might not agree with the rest of the world’s when
it comes to privacy. Since ...