+

Tagged With / 'Trojan'

August 1, 2010


Botnet: The Six Laws And Immerging Command & Control Vectors

New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Author: RICHARD C. BATKA Source: Hakin9 8/2010 https://hakin9.org What you will learn… BotNet design elements New BotNet communication vectors (advanced) Programs that can tell you if you are a part […]

Read more

August 1, 2010


Detecting Debuggers

Know your enemy. The more you know about your enemy, the more effectively you can fight him and protect from him. But this rule works in both directions. Not only do security specialists try to know about malicious code but also bad guys try to protect and hide from them. Author: MICHAEL R. HEINZL Source: […]

Read more

August 1, 2010


Is Anti-virus Dead – The answer is YES. Here’s why…

There have been billions of dollars in damages caused by exploiters on the Internet. These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chest – ranging from spyware, rootkits, trojans, viruses, worms, zombies and botnets to various other blended threats. From old viruses to these […]

Read more

July 1, 2010


Web Malware – Part 1

The Internet has been plagued by a variety of Malware that use the Web for propagation and as these threats loom around in the Internet it can infect even the smartest and the most tech savvy computer users. Author: RAJDEEP CHAKRABORTY Source: Hakin9 7/2010 https://hakin9.org What you will learn… Why the Malware landscape has changed recently […]

Read more

June 1, 2010


Hacking the Bad Guys

A brief BBC article today about a presentation at Syscan by Laurent Oudot from Tehtri Security got me thinking. The presentation was about the security holes in common malware and web kits, and how the bad folks don’t actually use the tools available to secure their own code. I didn’t get to see the presentation, […]

Read more

May 1, 2010


Beginner’s Guide to Cybercrime

Understanding Attack Methodologies and a More Proactive approach to Defense If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do you know where are the cybercrime magnets? Source: Hakin9 5/2010 https://hakin9.org What you will learn… Types […]

Read more

March 1, 2010

Articles admin Comments Off

Videojaking: Hijacking IP Video Calls

Have you ever wondered about the hacking technologies used in Hollywood movies like Ocean’s twelve or The Thomas Crown Affair to steal valuables like diamonds or sculptures? Author: FLORIAN EICHELBERGER Source: Hakin9 3/2010 https://hakin9.org Although auto-update functionality is widespread, having the behavioral pattern of a malware sample aids in its removal. In this article I want […]

Read more

January 1, 2010

Articles admin Comments Off

Detecting Debuggers

Know your enemy. The more you know about your enemy, the more effectively you can fight him and protect from him. But this rule works in both directions. Not only do security specialists try to know about malicious code but also bad guys try to protect and hide from them. Author: Marek Zmysłowski Source: Hakin9 […]

Read more

December 1, 2009


HackerDefender Rootkit for the Masses

Every month attackers are handed the latest 0-day exploit on a silver platter. There are tons of sites that post the latest exploit and security professionals rush to see exactly how the new exploit can be used to gain access to a remote computer. Author: CHRIS GATES Source: Hakin9 https://hakin9.org WHAT WILL YOU LEARN… How to use Hacker […]

Read more

June 1, 2008


Client-side Exploits

Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to the fact that clientside exploits target vulnerabilities on the client applications. Author: ANUSHREE REDDY Source:  Hakin9 6/2008 https://hakin9.org […]

Read more

June 1, 2008


Ad-Aware 2008 Plus

When I was a Help Desk supervisor, our tech support staff typically used a combination of two Anti-Spyware programs to clean Spyware infected PCs and Ad-Aware was always one of them. It gained a reputation with us as being a very dependable and effective program. Apparently we weren’t alone in our reliance on Ad-Aware because […]

Read more

December 1, 2007


Robot Wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can use to infect and take control of a target computer, and let’s see how we […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa