Bac à sable
From Botnets.fr
Revision as of 21:14, 5 August 2015 by
Eric.freyssinet
(
talk
|
contribs
)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to navigation
Jump to search
Link
A Foray into Conficker’s Logic and Rendezvous Points
https://www.usenix.org/legacy/events/leet09/tech/full papers/porras/porras.pdf
A case study on Storm worm
http://static.usenix.org/event/leet08/tech/full papers/holz/holz html/
A new iteration of the TDSS/TDL-4 malware using DGA-based command and control
https://www.damballa.com/downloads/r pubs/damballa discovery brief 9 2012.pdf
A study on botnet detection techniques
http://www.ijsrp.org/research paper apr2012/ijsrp-apr-2012-113.pdf
APT1: technical backstage
http://www.malware.lu/Pro/RAP002 APT1 Technical backstage.1.0.pdf
Adobe Flash Player 0-day and HackingTeam's Remote Control System
http://www.securelist.com/en/blog/208194112/Adobe Flash Player 0 day and HackingTeam s Remote Control System
An advanced hybrid peer-to-peer botnet
http://static.usenix.org/event/hotbots07/tech/full papers/wang/wang.pdf
Analyse de Xtreme RAT
http://code.google.com/p/malware-lu/wiki/en xtreme RAT
Analyse of the sample cdorked.A
http://code.google.com/p/malware-lu/wiki/en malware cdorked A
Analyse statique de Duqu stage 1
http://code.google.com/p/malware-lu/wiki/en static analysis duqu stage 1
Analyse statique de Duqu stage 2
http://code.google.com/p/malware-lu/wiki/en static analysis duqu stage 2
Analysis of TDL4
http://baesystemsdetica.blogspot.fr/2012/10/analysis-of-tdl4 8570.html
Analysis of Ysreef (a variant of Tobfy)
http://code.google.com/p/malware-lu/wiki/en malware Ysreef
Analysis of a “/0” stealth scan from a botnet
http://www.caida.org/publications/papers/2012/analysis slash zero/analysis slash zero.pdf
Analysis of functions used to encode strings in Flame (GDB script)
http://code.google.com/p/malware-lu/wiki/en flame analysis with script gdb
Analysis of the malware of Red October - Part 1
http://code.google.com/p/malware-lu/wiki/en malware redoctober
Analysis of the malware of Red October - Part 2
http://code.google.com/p/malware-lu/wiki/en malware redoctober2
Andromeda 2.7 features
http://blog.fortinet.com/Andromeda-2-7-Features/ blog.fortinet.com
Anunak:APT against financial institutions
https://www.fox-it.com/en/files/2014/12/Anunak APT-against-financial-institutions2.pdf
Armenian Bredolab creator jailed for computer sabotage
http://threatpost.com/en us/blogs/armenian-bredolab-creator-jailed-computer-sabotage-052312
AutoIT ransomware
http://code.google.com/p/malware-lu/wiki/en analyse autoit ransomware
Back to Stuxnet: the missing link
http://www.securelist.com/en/blog/208193568/Back to Stuxnet the missing link
BareBox: efficient malware analysis on bare-metal
http://www.cs.ucsb.edu/~chris/research/doc/acsac11 barebox.pdf
Battling the Zbot threat
http://download.microsoft.com/download/A/2/2/A226868B-7922-4655-BF48-F11DDEE3E63C/Battling the Zbot threat.pdf
Blackhole, CVE-2012-0507 and Carberp
http://blog.eset.com/2012/03/30/blackhole-cve-2012-0507-and-carberp blog.eset.com
BotGrep: finding P2P bots with structured graph analysis
http://static.usenix.org/events/sec10/tech/full papers/Nagaraja.pdf
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
https://www.damballa.com/downloads/a pubs/Usenix08.pdf
Botnet construction, control and concealment
http://www.shadowserver.org/wiki/uploads/Information/thesis botnet krogoth 2008 final.pdf
Botnet operation disabled
http://www.fbi.gov/news/stories/2011/april/botnet 041411
Botnet shutdown success story - again: disabling the new Hlux/Kelihos botnet
http://www.securelist.com/en/blog/208193431/Botnet Shutdown Success Story again Disabling the new Hlux Kelihos Botnet
Botnet shutdown success story: how Kaspersky Lab disabled the Hlux/Kelihos botnet
http://www.securelist.com/en/blog/208193137/Botnet Shutdown Success Story How Kaspersky Lab Disabled the Hlux Kelihos Botnet
Carberp + BlackHole = growing fraud incidents
http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents blog.eset.com
Carberp - a modular information stealing trojan
http://pxnow.prevx.com/content/blog/carberp-a modular information stealing trojan.pdf
Carberp gang evolution: CARO 2012 presentation
http://blog.eset.com/2012/05/24/carberp-gang-evolution-at-caro-2012 blog.eset.com
Carberp reverse engineering
http://quequero.org/Carberp Reverse Engineering
Carberp-in-the-Mobile
http://www.securelist.com/en/blog/208194045/Carberp in the Mobile
Carberp: it’s not over yet
http://www.securelist.com/en/blog/694/Carberp its not over yet
Case study of the Miner botnet
https://ccdcoe.org/sites/default/files/multimedia/pdf/5 7 PlohmannGerhards-Padilla ACaseStudyOnTheMinerBotnet.pdf
Chameleon botnet grabbed $6m A MONTH from online ad-slingers
http://www.theregister.co.uk/2013/03/19/chameleon botnet/
Citadel plitfi botnet report
http://www.cert.pl/news/6900/langswitch lang/en
Citadel trojan malware analysis
http://botnetlegalnotice.com/citadel/files/Patel Decl Ex20.pdf
Combatting point-of-sale malware
http://www2.trustwave.com/rs/trustwave/images/Special Report Combatting Point of Sale Malware.pdf
Conficker working group: lessons learned
http://www.confickerworkinggroup.org/wiki/uploads/Conficker Working Group Lessons Learned 17 June 2010 final.pdf
Cracking down on botnets
http://blogs.technet.com/b/microsoft blog/archive/2010/02/25/cracking-down-on-botnets.aspx
Cracking the encrypted C&C protocol of the ZeroAccess botnet
http://www.virusbtn.com/pdf/conference slides/2012/Morris-VB2012.pdf
DGAs and cyber-criminals: a case study
http://www.damballa.com/downloads/r pubs/RN DGAs-and-Cyber-Criminals-A-Case-Study.pdf (pdf)
DarkMegi rootkit - sample (distributed via Blackhole)
http://contagiodump.blogspot.fr/2012/04/this-is-darkmegie-rootkit-sample-kindly.html contagiodump.blogspot.fr
Department of Justice takes action to disable international botnet
http://www.justice.gov/opa/pr/2011/April/11-crm-466.html www.justice.gov
Digging inside Tinba malware - A walkthrough
http://secniche.blogspot.it/2012/06/two-weeks-back-tinba-malware-hit.html secniche.blogspot.it
Discerning relationships: the Mexican botnet connection
http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp discerning-relationships mexican-botnet.pdf
... further results
Navigation menu
Personal tools
Log in
Namespaces
Page
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Page information
Browse properties