An image is worth a thousand words.















Sample screenshots include:












































Stay tuned!

Takes you back doesn't it? What used to be a daily reality back in 2008 namely the use of iFrame injected scripts on major Web properties basically forwarding the redirecting legitimate traffic to client-side exploits serving web malware exploitation kits is still a valid practice in today's modern and sophisticated cybercrime ecosystem.

Stay tuned!

As I've recently came across several mainstream news articles on the use of Google AdSense to serve malware I've decided to share several screenshots circa 2008 which basically demonstrate the process.

Sample screenshots include:


Stay tuned!

With basic iFrame injecting scripts making their rounds back in 2008 including their use and participation in actual crowd-sourced DDoS attack campaigns internationally I've decided to share with everyone a sample screenshot of a sample iFrame DDoS script that was actually known to have been involved in a successful DDoS attack against major Iran-based web sites back in 2008.

Stay tuned!









Who would have thought? A mass SQL injection scanning and remotely exploitable including fuzzing capabilities built-in IRC-based botnet? I've decided to share with everyone some sample screenshots on the process with the idea to raise everyone's awareness that what used to be once a rocket science is today's reality in specific back in 2008 when I originally took these screenshots.

Sample screenshots include:



Stay tuned!

;;
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge - Designer: Douglas Bowman | Dimodifikasi oleh Abdul Munir Original Posting Rounders 3 Column