Clan x86

Technical (Development, Security, etc.) => General Security Information => Topic started by: iago on October 27, 2008, 05:11:03 pm

Title: How a criminal might infiltrate your network
Post by: iago on October 27, 2008, 05:11:03 pm
http://technet.microsoft.com/en-us/magazine/cc160808.aspx

Looks like a cool read, I just skimmed over the highpoints and looked at the non-Javascript pictures. :)
Title: Re: How a criminal might infiltrate your network
Post by: Camel on October 28, 2008, 01:56:23 pm
lol,
Code: [Select]
c:\warez>EvilTrojan -r 172.17.0.1 -a 192.168.2.112
Title: Re: How a criminal might infiltrate your network
Post by: iago on October 28, 2008, 02:30:03 pm
lol,
Code: [Select]
c:\warez>EvilTrojan -r 172.17.0.1 -a 192.168.2.112
Hmm?

If you're talking about the addresses, I assume they used the rfc1918 addresses for the same reason they use 555- phone numbers on movies.
Title: Re: How a criminal might infiltrate your network
Post by: Camel on October 28, 2008, 05:20:18 pm
No, I'm talking about c:\warez\EvilTrojan. It sounds like it's an article straight out of 1996, heh.
Title: Re: How a criminal might infiltrate your network
Post by: Lead on October 29, 2008, 07:39:28 am
No, I'm talking about c:\warez\EvilTrojan. It sounds like it's an article straight out of 1996, heh.

'Melissa' aka EVIL SHENANIGANS