HTTP
Jump to navigation
Jump to search
Botnets whose C&C protocol is HTTP
- Alebrije, AlertLock, Alina, Americana Dreams, Andromeda, AnnLoader, Apbot, Asprox, Athena, BandarChor, Beebone, Bobax, Bradop, Carberp, Cimbot, Citadel, Comfoo, Conficker, Coreflood, Crisis, Cutwail, Cythosia, Dabvegi, DarkMegi, Darkness, Devdar, DistTrack, Dofoil, Dorifel, Duqu, Dyre, Emit, Encriyoko, Expiro, Festi, Flashback, Gauss, Gema, GoldInstall, Grum, Harnig, HerpesNet, Hiloti, Hodprot, IKee.B (botnet), IcoScript, Illusion, Infinity, Khan, Leouncia... further results
Malware whose C&C protocol is HTTP
Publications covering C&C protocol HTTP
- A case study on Storm worm, Analysis of the Finfisher lawful interception malware, Apple took 3 years to fix Finfisher trojan hole, Detection and classification of different botnet C&C channels, Egypt Finfisher intrusion tools and ethics, Encyclopedia entry: Win32/Oderoor, Guys behind Gauss and Flame are the same, Harnig is back, Kraken botnet infiltration, Necurs Quick Analysis, Ngrbot steals information and mine Bitcoins, NjRAT & H-Worm variant infections continue to rise, OSX.Iservice technical details, Reversing the wrath of Khan, Scareware locks down computer due to child porn and terrorism, TDL3 : The rootkit of all evil, TDL3 : Why so serious, TDL4 - Top Bot, The anatomy of a botnet, The case of TDL3, The evolution of TDL: conquering x64