Last News
Blog discontinued...1000 sorry! Hope that visitors have enjoyed the stuff... Visit kareldjag.over-blog for more news in a near futur :)
Blog discontinued...1000 sorry! Hope that visitors have enjoyed the stuff... Visit kareldjag.over-blog for more news in a near futur :)
Rootkit technologies detection and prevention: - with Rootkit Demo1.2: this russian demo uses is designed to hide its presence and to make speakers beeps.RKDemo does not use particular hidding method, but take advantage of Windows functions (returs an...
PART 2: IN THE WILD WITH REAL MALWARES 7) Boot Sector/Bios/MBR protection: MBR virus When a computer is not protected with a Bios password, and neither by an antivirus (only HIPS), an ill-intentioned person can easly boot the computer from external drives...
For some tests, we consider the HIPS as disabled.These tests cover scenario where ill-intentioned person wants to install a malware (backdoor, spy tools like keyloggers etc) in a computer directly with a physical access.We consider that this person: -...
CLIENT/SERVER SIDE ATTACKS and other tests: here we distinguish attacks which occur via browser from malwares which infect the system: NB.As some vulnerabilities could be patched as soon as possible, the tests are run on Windows XP2 updated until the...
FIRST PART based on the behaviour (more screenshots here) 1a.Execution protection -with the TaskManager launched via Ctrl+Alt+Del -via start and execute menu -with srip32 launched by explorer.exe -with shellcode for running notepad.exe: and calc.exe (2...
This rootkit is a pure "hider" (intrusion or hacker tool): it acts as an hidden service/driver.But it does not hide its registry keys, that makes it easy to detect for users who know their system well.In this example, we purposefully take the side and...
Data theft via sniffing: f. with a command line sniffer (currently detected by none antivirus on Virus Total): We run (locally) the sniffer and connect to the web mail. g. with Sniffer (Renamed, not detected by antivirus on Virus Total): We run (locally)...
Here we illustrate some data theft attacks which can really be used in the wild. a. with trojan demo: This demo illustrates an "in the fly data theft attack" : once executed, it launches calc.exe, lists My Documents folder files and reports them (HTML)...
OVERALL ________________________ Results and Ratings : * First part : 94 %: Excellent. * Second part : 71.5 %: Very good. * Third part : 23.5 %: Not sufficient. Rating threat by threat : The result may often depend on the user's configuration : what is...