Sunday, April 6th, 2008
Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses.
Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
Some useful syntax reminders for SQL Injection into MySQL databases...
This post is part of a series of SQL Injection Cheat Sheets. In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend. This helps to ...
Posted in Coding, Internet, Networking, Privacy, Security, Software | No Comments
Sunday, April 6th, 2008
As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...
Posted in Coding, Internet, Privacy, Security | No Comments
Saturday, April 5th, 2008
Posted in Coding, General BS, Windows | 2 Comments
Friday, April 4th, 2008
We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments