important paper for you guys.
NIELIT STUDENTS FORUM :: Certified System Security Solution Designer [CSSSD] Level-3 :: Certified System Security Solution Designer [CSSSD]
Page 1 of 1
important paper for you guys.
consist of
Credits to the owners/makers of those papers.
The White Hats Report ~ Reporting what the main stream media refuses to report. Some whitehat papers of the anomalies of the government and other economic leaders.
Malware Intelligence. Security against malicious code, computer intelligence and other threats Basic Papers / Check other pages for some basic stuff about Security Viruses.
SecLists.Org Security Mailing List Archive It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.
- Code:
FILE 2007_28C3_Effective_DoS_on_web_application_platforms.pdf
FILE 3755.Microsoft Study into b70.pdf
FILE A Case Study on the Asprox Botnet SQL Infection Dynamics.pdf
FILE A Comparitive Analysis of Rootkit Detection Techniques.pdf
FILE A Multifaceted Approach to Understanding the Botnet Phenomenon.pdf
FILE a_museum_of_api_obfuscation_on_win32.pdf
FILE Abusing Forced Inline in C _ Development & Security.htm
FILE Abusing Forced Inline Part 2 Breakpoints _ Development & Security.htm
FILE Advanced Persistent Threats.pdf
FILE advancedApproachToDllInjectionAndHooking.pdf
FILE An Advanced Hybrid Peer-to-Peer Botnet.pdf
FILE An Analysis of Conficker C.html
FILE An Analysis of Conficker.htm
FILE Analysis_W32.Virut_.ce_.pdf
FILE Analysis-of-TR.Spy_.SpyEye.pdf
FILE an-overview-of-rustock.html
FILE Anti-Debugging A Developer's View.pdf
FILE anti-emulation through time-lock puzzles.pdf
FILE anti-vm anti-emulation.pdf
FILE AusCERT_2011_Andreas_Baumhof_V2.pdf
FILE auscert2009-confickersinkhole.pdf
FILE BH_US_08_Stewart_Protocols_of_the_Storm.pdf
FILE BlackEnergy+DDoS+Bot+Analysis.pdf
FILE blackhat2012-paper.pdf
FILE blackhat2012-presentation.pdf
FILE blackhole_paper_mar2012.pdf
FILE Camouflage in Malware.pdf
FILE Carberp - A Modular Information Stealing Trojan.pdf
FILE Carberp and Ring 0 (+ blackhole).pdf
FILE Carberp_Analysis (Trusteer).pdf
FILE clash-titans-zeus-spyeye_33393.pdf
FILE Combating Threats - W32 Sality.pdf
FILE common substring analysis.pdf
FILE Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf
FILE conficker-analysis.pdf
FILE contextcarberp.htm
FILE ContextCarberpAnalysis.htm
FILE COSIC_Srizbi.pdf
FILE costofspam.pdf
FILE cutwail-LEET11.pdf
FILE decrypting-carberp-c-communication.html
FILE defeating rop.pdf
FILE entropy_analysis_encrypted_packed_malware.pdf
FILE ESET_win32georbot_analysis_final.pdf
FILE evasion and detection of metamorphic viruses.pdf
FILE EventPairsHandle.pdf
FILE FASTFLUX.HTM
FILE flame.pdf
FILE hc128_p3.pdf
FILE Heaven'sGate.html
FILE Hodprot-Report.pdf
FILE how-to-defeat-koobface.html
FILE HS-P005_ReflectiveDllInjection.pdf
FILE hydraq_final_231538.pdf
FILE iwm-koobface.pdf
FILE kasperskyOnRustock.htm
FILE KelihosAnalysis.htm
FILE killing-the-beast.html
FILE king-of-spam-festi-botnet-analysis.pdf
FILE Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co.htm
FILE Koobface Anti-Emulation Time Lock Trick _ Security News.htm
FILE KYE-Conficker.pdf
FILE leouncia-yet-another-backdoor.html
FILE leouncia-yet-another-backdoor-part-2.html
FILE Lessons from Conficker.pdf
FILE little doggy.pdf
FILE malcode-context-api-abuse_33649.pdf
FILE malwareforensics.pdf
FILE Mariposa Botnet Analysis.pdf
FILE More human than human – Flame’s code injection techniques.htm
FILE Obfuscation of Executable Code to Improve Resistance to Static Disassembly.pdf
FILE On_the_Analysis_of_the_Zeus_Botnet_Crimeware.pdf
FILE opaque predicate detection by abstraction.pdf
FILE opaque_predicates1.pdf
FILE opaque_predicates2.pdf
FILE Peer-to-Peer Communication Across Network Address Translators.htm
FILE PEST-CONTROL.pdf
FILE Process-Hollowing.pdf
FILE provenance.pdf
FILE Puppet process.htm
FILE Reflections on Conficker.pdf
FILE remote-library-injection.pdf
FILE Robust Efficient Distributed RSA-Key Generation.pdf
FILE ROOTKITS.PDF
FILE Roots_of_Evil (general rootkit).pdf
FILE Roundtable on Malware Defense.pdf
FILE rp-predicting-stealth-attacks.pdf
FILE RustockB.pdf
FILE RustockC (Dr. Web).pdf
FILE Same Botnet, Same Guys, New Code -- Kelihos.pdf
FILE Shin_TIFS12_Conficker.pdf
FILE Silon_Analysis_v5_PR-MBfinal.pdf
FILE skywiper.pdf
FILE Sophos_ZeroAccess_Botnet.pdf
FILE SpyEye_Soldier_BotnetCaseStudy.pdf
FILE Storm_Worm_Botnet_Analysis_-_June_2008.pdf
FILE study_of_pushdo.pdf
FILE Stuxnet_Under_the_Microscope.pdf
FILE SybilAttack.pdf
FILE TDL3-Analysis.pdf
FILE The Art of Bootkit Development.pdf
FILE The Art of Unpacking.pdf
FILE The Growing Harm of Not Teaching Malware.pdf
FILE The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks.htm
FILE The New Face of War (Stuxnet).pdf
FILE The Ultimate Anti-Debugging Reference.pdf
FILE the_bredolab_files.pdf
FILE the_downadup_codex_ed1.pdf
FILE the_downadup_codex_ed2.pdf
FILE The_Evolution_of_TDL4x64.pdf
FILE the-dead-giveaways-of-vm-aware-malware.html
FILE ThisPassingStorm.pdf
FILE top50badhostsandnetworks.pdf
FILE Towards Static Analysis of Virtualization-Obfusctated Binaries.pdf
FILE trojan_zeroaccess_infection_analysis.pdf
FILE utilizing entropy to identify undetected malware.pdf
FILE w32_duqu_the_precursor_to_the_next_stuxnet.pdf
FILE w32_qakbot_in_detail.pdf
FILE w32_stuxnet_dossier.pdf
FILE W32_Waledac.pdf
FILE w32_xpaj_b (complex PE infector).pdf
FILE waledac-ec2nd09.pdf
FILE weaver-conficker.pdf
FILE wp_the-real-face-of-koobface.pdf
FILE wp_w32-tinba-tinybanker.pdf
FILE Yet_Another_Rustock_Analysis.pdf
FILE Your Botnet is My Botnet--Analysis of a Botnet Takeover.pdf
FILE zeroaccess_analysis.pdf
FILE ZeroAccess’s trick – A wolf in sheep’s clothing.htm
FILE zeroaccess2.pdf
FILE zeroaccess-code-injection-chronicles.htm
FILE zeroaccess-misleads-memory-file-link.htm
FILE zeus_king_of_bots.pdf
FILE ZeuS_the_missing_manual_v1.pdf
FILE ZeusSpyEyeBankingTrojanAnalysis.pdf
FOLDER Abusing Forced Inline in C _ Development & Security_files\
FOLDER Abusing Forced Inline Part 2 Breakpoints _ Development & Security_files\
FOLDER An Analysis of Conficker C_files\
FOLDER An Analysis of Conficker_files\
FOLDER an-overview-of-rustock_files\
FOLDER Context_files\
FOLDER decrypting-carberp-c-communication_files\
FOLDER fastflux_files\
FOLDER Heaven'sGate_files\
FOLDER how-to-defeat-koobface_files\
FOLDER kasperskyOnRustock_files\
FOLDER KelihosAnalysis_files\
FOLDER killing-the-beast_files\
FOLDER Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co_files\
FOLDER Koobface Anti-Emulation Time Lock Trick _ Security News_files\
FOLDER leouncia-yet-another-backdoor_files\
FOLDER leouncia-yet-another-backdoor-part-2_files\
FOLDER More human than human – Flame’s code injection techniques_files\
FOLDER Peer-to-Peer Communication Across Network Address Translators_files\
FOLDER Puppet process_files\
FOLDER The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks_files\
FOLDER the-dead-giveaways-of-vm-aware-malware_files\
FOLDER ZeroAccess’s trick – A wolf in sheep’s clothing_files\
FOLDER zeroaccess-code-injection-chronicles_files\
FOLDER zeroaccess-misleads-memory-file-link_files\
[code][/code]
- Code:
www.mediafire.com/download/656jfjttc45zi3k/Publications.rar
Credits to the owners/makers of those papers.
The White Hats Report ~ Reporting what the main stream media refuses to report. Some whitehat papers of the anomalies of the government and other economic leaders.
Malware Intelligence. Security against malicious code, computer intelligence and other threats Basic Papers / Check other pages for some basic stuff about Security Viruses.
SecLists.Org Security Mailing List Archive It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.
sachinrana135- Senior mentor
- Posts : 35
Points : 117
Reputation : 12
Join date : 2014-01-12
NIELIT STUDENTS FORUM :: Certified System Security Solution Designer [CSSSD] Level-3 :: Certified System Security Solution Designer [CSSSD]
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum