Targeted attacks: From being a victim to counter attacking
Page 1 of 1
Targeted attacks: From being a victim to counter attacking
This paper is an analysis of a common sort of targeted attack per-formed nowadays against many organizations.As it turns out,publicly available remote administration tools (which we usually call trojans) are frequently used to maintain control over the victim after a success-ful penetration. The paper does not focus on particular exploitation techniques used in these attacks. Instead, it aims to get a closer look at one of such trojans. First chapters describe a way to gure out which trojan has been used. The following chapters describe in brief the architecture, capabilities and techniques employed by developers of the identi ed trojan, including mechanisms to hide its presence in the system, and to cover its network trace. The paper presents all the techniques used to perform the analysis. In the nal chapters,a quick vulnerability analysis has been performed to show that such intruders could also be an object of an attack. . .
Download PDF
Download PDF
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» Zero-Day PowerPoint Attacks Under Way
» Interception Attacks Against SSL
» Side Channel Attacks in SSL
» Automated SEO poisoning attacks explained
» Protecting Browsers from DNS Rebinding Attacks
» Interception Attacks Against SSL
» Side Channel Attacks in SSL
» Automated SEO poisoning attacks explained
» Protecting Browsers from DNS Rebinding Attacks
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
|
|