Search results

Jump to navigation Jump to search
Results 101 – 117 of 132
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...bling that of Flame, a similar code base and system for communicating to C&C servers, as
    3 KB (394 words) - 23:24, 21 March 2016
  • ...xecute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wil
    710 bytes (101 words) - 12:15, 19 March 2016
  • <NOWIKI>87.107.121.138 POST /price.php </NOWIKI> 21/10/12 - SubC&C
    1 KB (149 words) - 15:47, 8 August 2015
  • ...d and were very easy to reverse engineer. The Trojan was written in Visual C++ either in a hurry or by an untrained programmer. We found a lot of bugs i
    1 KB (161 words) - 22:05, 5 August 2015
  • The trojan in question is rather sophisticated. It is written in C++ and uses rootkit techniques to conceal its presence, though on occasion,
    1,020 bytes (154 words) - 00:06, 21 August 2015
  • ...executables, which we have reverse engineered to an approximation of their C source code implementation. The iKee bot is one of the latest offerings
    1 KB (160 words) - 21:50, 5 August 2015
  • ...o node comes pre-configured with the locations of two Command & Control (C&C) servers, known as “gates” from which it can download updates, receive
    3 KB (491 words) - 21:31, 5 August 2015
  • |Author=Ping Wang, Sherri Sparks, Cliff C. Zou, ...es robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and re
    1 KB (201 words) - 19:38, 31 July 2015
  • |Language1=C#
    1 KB (171 words) - 15:48, 8 August 2015
  • ...=* Uses twitter predefined accounts for commands (to point at URLs for the C&Cs)
    1 KB (165 words) - 15:50, 8 August 2015
  • ...al service for RDP access, all maintaining identical copies of the custom, C# server manager software. These servers also act as the stolen data drops.
    2 KB (258 words) - 19:02, 7 February 2015
  • |Introduction=Autrement appelé ''Destination Darkness Outlaw System'', c'est un botnet développé pour réaliser des attaques en déni de service d
    2 KB (200 words) - 15:45, 8 August 2015
  • ...the HTran connection bouncer has been observed, indicating that selected C&C’s were simply compromised sites used to relay traffic elsewhere.
    2 KB (308 words) - 16:16, 5 August 2015
  • === C === === C ===
    10 KB (847 words) - 12:17, 14 March 2020
  • ...executables, which we have reverse engineered to an approximation of their C source code implementation. The iKee bot is one of the
    2 KB (306 words) - 16:35, 31 July 2015
  • ** Soit à sens unique, c'est-à-dire permettant uniquement au bot de recevoir des commandes
    3 KB (467 words) - 10:39, 27 July 2015
  • |Language1=C++
    4 KB (616 words) - 22:44, 1 February 2015

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)