Trojan

Detecting Debuggers

Know your enemy. The more you know about your enemy, the more effectively you can fight him and protect from him. But this rule works in both directions. Not only do security specialists try to know about malicious code but…

Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans,…

Web Malware – Part 1

The Internet has been plagued by a variety of Malware that use the Web for propagation and as these threats loom around in the Internet it can infect even the smartest and the most tech savvy computer users. Author: RAJDEEP…

Hacking the Bad Guys

A brief BBC article today about a presentation at Syscan by Laurent Oudot from Tehtri Security got me thinking. The presentation was about the security holes in common malware and web kits, and how the bad folks don’t actually use…

Beginner’s Guide to Cybercrime

Understanding Attack Methodologies and a More Proactive approach to Defense If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do…

Videojaking: Hijacking IP Video Calls

Have you ever wondered about the hacking technologies used in Hollywood movies like Ocean’s twelve or The Thomas Crown Affair to steal valuables like diamonds or sculptures? Author: FLORIAN EICHELBERGER Source: Hakin9 3/2010 https://hakin9.org Although auto-update functionality is widespread, having the…

Detecting Debuggers

Know your enemy. The more you know about your enemy, the more effectively you can fight him and protect from him. But this rule works in both directions. Not only do security specialists try to know about malicious code but…

HackerDefender Rootkit for the Masses

Every month attackers are handed the latest 0-day exploit on a silver platter. There are tons of sites that post the latest exploit and security professionals rush to see exactly how the new exploit can be used to gain access…

Client-side Exploits

Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to…

Ad-Aware 2008 Plus

When I was a Help Desk supervisor, our tech support staff typically used a combination of two Anti-Spyware programs to clean Spyware infected PCs and Ad-Aware was always one of them. It gained a reputation with us as being a…

Robot Wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can…