Exploit the possiblities
Showing 1 - 7 of 7 RSS Feed

Files

Metamorphic Worms: Can They Remain Hidden?
Posted Feb 2, 2015
Authored by Reethi Kotti

Whitepaper that discusses types of computer worms and how metamorphic worms differ from the rest.

tags | paper, worm
MD5 | 4ae6e561c0c9dbfec13ce2965d4d8a49
To Kill A Centrifuge
Posted Nov 21, 2013
Authored by Ralph Langner | Site langner.com

Whitepaper called To Kill a Centrifuge - A Technical Analysis of What Stuxnet's Creators Tried to Achieve.

tags | paper, worm
MD5 | 378b0d6b52e08452f849a30292b24bad
How Conficker Makes Use Of MS08-067
Posted Apr 15, 2009
Authored by Bui Quang Minh, Hoang Xuan Minh

Whitepaper called How Conficker makes use of MS08-067.

tags | paper, worm
MD5 | 89a1d4338199280d5e76e4e9fa342747
Using ShoutBoxes To Control Malicious Software
Posted Apr 14, 2009
Authored by Feathers McGraw

Whitepaper called Using "ShoutBoxes" to control malicious software.

tags | paper, worm
MD5 | 551ed6acbcc96e5e1cda2bfd514bbbeb
InqTanaThroughTheEyes.txt
Posted Feb 26, 2006
Authored by Kevin Finisterre

Whitepaper written to address both FUD and rumors surrounding the release of detailed information about the InqTana proof of concept worm.

tags | paper, worm, proof of concept
MD5 | bf9d8ed44386ceecb2b2acec222a0edb
symbian.txt
Posted Dec 11, 2004
Authored by Geza

Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.

tags | paper, worm
MD5 | f28694cfcdc0b7e360e68d2a26810386
Application_Worms.pdf
Posted Mar 30, 2004
Site imperva.com

White-paper from Imperva's Application Defense Center discussing the possibility of automated, self-propagating attacks on custom web application code. It shows that such attacks are not only feasible but that their theoretical success rate is far great than worms targeting commercial infrastructure.

tags | paper, worm, web
MD5 | c9c0bed70fb5d395c40b3e6e29eec58c
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Triton Exploited Zero-Day Flaw To Target Industrial Systems
Posted Jan 19, 2018

tags | headline, hacker, malware, cyberwar, scada
Apple Sued Over Being Susceptible To Meltdown / Spectre
Posted Jan 19, 2018

tags | headline, flaw, apple, intel
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close