Hacking the Malware– A reverse-engineer’s analysis
ABSTRACT
This paper attempts to document an approach on how the hackers make use of the vulnerabilities to install malicious software on the vulnerable machine. A comprehensive reverse code engineered analysis of the malicious software (Win32.Qucan.a) and the various protection schemes against the worm by various security products are also discussed.
I hope this document will help the Malware researchers, Intrusion Analysts and other Security professionals to conduct a more viable and comprehensive research.
The complete paper can be downloaded from
http://geocities.com/rahulmohandas/hacking_the_malware.pdf
MD5: F875DADCAD00792D753CC96BD57E0F72
or
3 Comments:
The paper is really awesome, it truly depicts the internals of the worm...keep up your research...
you checked in on some pretty weak protection defenses -- have you checked behavioral based stuff like at www.novatix.com? what do you think of them?
good paper. interesting to see taskkill used here. post it on the offensive computing site, your geocities transfer limit is surpassed!
Post a Comment
<< Home