dnschef | projects | sprawl http://thesprawl.org/projects/dnschef/
dnschef | projects | sprawl http://thesprawl.org/projects/dnschef/
How Red October went undetected for 5 years http://www.itproportal.com/2013/01/16/how-red-october-went-undetected-for-5-years/
Bitdefender Releases Free Red October Removal Tool | Bitdefender Labs http://labs.bitdefender.com/2013/01/bitdefender-releases-free-red-october-removal-tool/
“Red October” – part two, the modules https://www.securelist.com/en/blog/208194091/Red_October_part_two_the_modules
Assim como não existe apenas um idioma estrangeiro, não existe só um tipo de inimigo. Eis que entre potenciais atacantes, nem todos pensam da mesma forma. Mesmo entre aqueles que se juntam para uma missão ou objetivo comum, com frequência há divergências sobre como alcançar o objetivo. Então, q… http://www.cic.unb.br/~pedro/trabs/peteherzog.html
Two Years of Fast and Easy Hacking http://blog.strategiccyber.com/2012/11/28/two-years-of-fast-and-easy-hacking/
How to Find a Backdoor in a Hacked WordPress Site and Fix It http://www.wpbeginner.com/wp-tutorials/how-to-find-a-backdoor-in-a-hacked-wordpress-site-and-fix-it/
Util – Win32 Window Handle Hijack (simple) v1.0.exe http://diniscruz.blogspot.co.uk/2012/11/util-win32-window-handle-hijack-simple.html
Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime — ENISA http://www.enisa.europa.eu/activities/cert/support/fight-against-cybercrime/good-practice-guide-for-addressing-network-and-information-security-aspects-of-cybercrime
ISM – Information Security Manual http://www.dsd.gov.au/infosec/ism/index.htm