Difference between revisions of "HTTP"
Jump to navigation
Jump to search
(Created page with "{{Protocol summary}}") |
|||
Line 1: | Line 1: | ||
{{Protocol summary}} | {{Protocol summary | ||
|Architecture=Centralized | |||
}} |
Latest revision as of 18:21, 2 August 2015
Botnets whose C&C protocol is HTTP
- Alebrije, AlertLock, Alina, Americana Dreams, Andromeda, AnnLoader, Apbot, Asprox, Athena, BandarChor, Beebone, Bobax, Bradop, Carberp, Cimbot, Citadel, Comfoo, Conficker, Coreflood, Crisis, Cutwail, Cythosia, Dabvegi, DarkMegi, Darkness, Devdar, DistTrack, Dofoil, Dorifel, Duqu, Dyre, Emit, Encriyoko, Expiro, Festi, Flashback, Gauss, Gema, GoldInstall, Grum, Harnig, HerpesNet, Hiloti, Hodprot, IKee.B (botnet), IcoScript, Illusion, Infinity, Khan, Leouncia... further results
Malware whose C&C protocol is HTTP
Publications covering C&C protocol HTTP
- A case study on Storm worm, Analysis of the Finfisher lawful interception malware, Apple took 3 years to fix Finfisher trojan hole, Detection and classification of different botnet C&C channels, Egypt Finfisher intrusion tools and ethics, Encyclopedia entry: Win32/Oderoor, Guys behind Gauss and Flame are the same, Harnig is back, Kraken botnet infiltration, Necurs Quick Analysis, Ngrbot steals information and mine Bitcoins, NjRAT & H-Worm variant infections continue to rise, OSX.Iservice technical details, Reversing the wrath of Khan, Scareware locks down computer due to child porn and terrorism, TDL3 : The rootkit of all evil, TDL3 : Why so serious, TDL4 - Top Bot, The anatomy of a botnet, The case of TDL3, The evolution of TDL: conquering x64