A Look at a Bank Worm

Wednesday, April 23rd, 2008

Malware authors will often have their files display something to the user so that they actually believe the file is legitimate. Many of us have experienced such tricks, including fake errors stating that a specific file could not be found or that the application failed to load properly. Today we ...

Reverse-Engineering Exploits from Patches

Wednesday, April 23rd, 2008

The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P', automatically generate an exploit for the potentially unknown vulnerability present in P but fixed in P'. In this paper, we propose techniques for automatic patch-based exploit generation, and show that our ...

Create a mirror of a website with Wget

Wednesday, April 23rd, 2008

GNU’s wget command line program for downloading is very popular, and not without reason. While you can use it simply to retrieve a single file from a server, it is much more powerful than that and offers many more features. One of the more advanced features in wget is the mirror ...

Kraken Reverts to HTTP

Tuesday, April 22nd, 2008

Following a friendly heads up from someone yesterday morning, I re-loaded the following Kraken samples into my honeypot: 1d51463150db06bc098fef335bc64971 65b958bf6f5eddca3d9455354af08b6f 6ec7d67d5553cbec2a99c7fbe385a729 7ecef2f126e66e7270afa7b803f715bc 8fd8c67103ec073d9303a7fbc702f89a and began monitoring them. Each sample proceeded to update itself; the updated binary is around 160KB, given a random name and placed in the system32 directory, and no longer has an imagefile icon. The names/MD5 values of ...

Malicious Flash on LiveJournal.com

Tuesday, April 22nd, 2008

Sounds more of an annoyance than it does "malicious" but the folks over at Spyware Sucks has an interesting post about a bad flash banner being posted on Livejournal.com.  I just thought I'd share.