The Honeynet ProjectThe Honeynet Project

  • Old Homepage

Navigation

  • About us
  • Blogs
    • Honeynet Project Blog
  • Funding/Donations
  • Challenges
  • Chapters
  • Papers
  • Projects
  • Code of Conduct
  • Google SoC
    • Google SoC 2019
      • Application Tips
      • Project Ideas
      • Student Template
    • Google SoC 2018
    • Google SoC 2017
    • Google SoC 2016
    • Google SoC 2015
    • Google SoC 2014
    • Google SoC 2013
    • Google SoC 2012
    • Google SoC 2011
    • Google SoC 2010
    • Google SoC 2009
  • Recent posts
  • Security Workshops
    • 2019 - Austria
    • 2018 - Taiwan
    • 2017 - Canberra
    • 2016 - San Antonio
    • 2015 - Stavanger
    • 2014 - Warsaw
    • 2013 - Dubai
    • 2012 - SF Bay Area
    • 2011 - Paris

Internal

  • Login
  • Recent posts
Home

Know Your Enemy: Behind the Scenes of Malicious Web Servers

Sun, 08/17/2008 - 18:04 — jamie.riden
  • Twitter logo Twitter
  • Facebook logo Facebook
  • LinkedIn logo LinkedIn

The Honeynet Project http://www.honeynet.org Christian Seifert - The New Zealand Honeynet Project Last Modified: 7 November 2007
 

  • INTRODUCTION
  • WEB EXPLOITATION KITS OVERVIEW
  • IP TRACKING
  • TARGETS
  • EXPLOIT SERVERS
  • OBFUSCATION
  • CONCLUSIONS
  • ACKNOWLEDGEMENTS
  • FURTHER READING
  • ABOUT THE AUTHOR
  • APPENDIX A: Mpack State Changes
  • REFERENCES
INTRODUCTION ›
  • Printer-friendly version
  • Twitter logo Twitter
  • Facebook logo Facebook
  • LinkedIn logo LinkedIn
Blog Feed
LinkedIn
Facebook
Twitter
YouTube

We are a 501c3 non-profit, all volunteer organization. Consider donating to support our forensic challenges, tools development, and research.

Latest tweets

@ProjectHoneynet tweetsfollow @ProjectHoneynet

Papers

  • Know Your Enemy: Containing Conficker
  • Know Your Enemy Lite: Proxy Threats - Socks v666
  • Know Your Enemy: Malicious Web Servers
  • Know Your Enemy: Fast-Flux Service Networks
  • Know Your Enemy: Behind the Scenes of Malicious Web Servers
    • INTRODUCTION
    • WEB EXPLOITATION KITS OVERVIEW
    • IP TRACKING
    • TARGETS
    • EXPLOIT SERVERS
    • OBFUSCATION
    • CONCLUSIONS
    • ACKNOWLEDGEMENTS
    • FURTHER READING
    • ABOUT THE AUTHOR
    • APPENDIX A: Mpack State Changes
    • REFERENCES
  • Know your Enemy: Web Application Threats
  • Know Your Enemy: A Forensic Analysis
  • Know Your Enemy: Defining Virtual Honeyents
  • Know Your Enemy: GenII Honeynets
  • Know Your Enemy: Honeynets
  • Know Your Enemy: Honeynets In Universities
  • Know Your Enemy: Honeywall CDROM
  • Know Your Enemy: Learning with User-Mode Linux
  • Know Your Enemy: Passive Fingerprinting
  • Know your Enemy: Phishing
  • Know Your Enemy: Sebek
  • Know Your Enemy: Statistics
  • Know Your Enemy: The Social Dynamics of Hacking
  • Know your Enemy: Tracking Botnets
  • Know Your Enemy: Trends
  • Know Your Enemy: Worms at War
  • Know Your Tools: Glastopf - A dynamic, low-interaction web application honeypot
  • Know Your Tools: Qebek – Conceal the Monitoring
  • Know Your Tools: use Picviz to find attacks
  • Know Your Enemy: Automated Credit Card Fraud
  • Know Your Enemy: Motives
  • Know Your Enemy: III
  • Know Your Enemy: II
  • Know Your Enemy: I