Je hebt een klacht over de onderstaande posting:
Bron: http://isc.sans.org/ Diary van 6 mei - Catch of the day: smelly malware With the suspicious nature common to malware survivors, ISC reader Phil "got a bit worried" when he noticed that a web site was opening a zero-width frame that seemed to hide something. After digging around some, he found his hunches confirmed, and also two files that none of the AV vendors on virustotal.com seemed to recognize as hostile. Here's a write-up of what we found, to sharpen your malware survivor senses. Some of the original HTML off the hostile site had to be heavily modified for this write-up, mainly by cutting out sections or converting characters to "X". We woudln't want a SANS ISC diary to trigger your workstation or perimeter antivirus... The base exploit page IFRAME ID=e1 SRC='/e1/' WIDTH=0 HEIGHT=0 IFRAME ID=e2 SRC='/e2/' WIDTH=0 HEIGHT=0 IFRAME ID=e3 SRC='/e3/' WIDTH=0 HEIGHT=0 Exploit #1 - Java Classloader Vulnerability The first exploit, hidden behind the "e1" frame, is a ...
Beschrijf je klacht (Optioneel):