Overblog Suivre ce blog
Administration Créer mon blog
Rootkit test 3

Rootkit test 3

Rootkit technologies detection and prevention: - with Rootkit Demo1.2: this russian demo uses is designed to hide its presence and to make speakers beeps.RKDemo does not use particular hidding method, but take advantage of Windows functions (returs an...

Lire la suite

METHODOLOGY Part 2

METHODOLOGY Part 2

PART 2: IN THE WILD WITH REAL MALWARES 7) Boot Sector/Bios/MBR protection: MBR virus When a computer is not protected with a Bios password, and neither by an antivirus (only HIPS), an ill-intentioned person can easly boot the computer from external drives...

Lire la suite

METHODOLGY Part 3

METHODOLGY Part 3

CLIENT/SERVER SIDE ATTACKS and other tests: here we distinguish attacks which occur via browser from malwares which infect the system: NB.As some vulnerabilities could be patched as soon as possible, the tests are run on Windows XP2 updated until the...

Lire la suite

METHODOLOGY Part 1

METHODOLOGY Part 1

FIRST PART based on the behaviour (more screenshots here) 1a.Execution protection -with the TaskManager launched via Ctrl+Alt+Del -via start and execute menu -with srip32 launched by explorer.exe -with shellcode for running notepad.exe: and calc.exe (2...

Lire la suite