Search:

Type: Posts; User: Owl101; Keyword(s):

Search: Search took 0.03 seconds.

  1. Thread: Infection

    by Owl101
    Replies
    11
    Views
    19,400

    Trealin, you're right for the most part, that...

    Trealin, you're right for the most part, that being the part about files being crafted specifically to make use of a vulnerability.

    Another prime example is the WMF exploit (my favorite) for...
  2. Replies
    13
    Views
    10,743

    In most cases corporates have those ports open...

    In most cases corporates have those ports open accross their networks as they are used for authenticating to domain controllers and accessing file server shares and what nots.

    Ideally the ports...
  3. Replies
    10
    Views
    12,743

    By the sounds of things you could probably make...

    By the sounds of things you could probably make do with a summary version of the logs which is quite an easy way of identifying patterns in the log files.

    Consdering that I've seen no mention of...
Results 1 to 3 of 3