|
|
|
|
|
|
Author: Chris Snow
Company: WittySecurity LTD
Region: United States
Website: www.computersecurity.org
Memorable Quote 1: You can never be lost when you have purpose
Memorable Quote 2: An ounce of prevention is worth a pound of cure
Author Comment / Biography: Chris Snow is certified by: (CISSP,CAP,PMP,CCNA,CEH,CNDA,OSCP,CISM,Linux+,Network+,Security+,iNet+) and is a Cyber Security Specialist with 20 years of experience of penetration testing, blue teaming, network security design and network security engineer.
|
Displaying 1 to 4 of 4 articles |
|
Pages:
1
|
Articles by Chris Snow |
1. Great Cannon of China Man-on-the-side DDoS Attack - Actual Traffic and Analysis
August 11, 2015
So by now everyone has heard of China's Great Cannon DDoS attack on GITHUB and other targets, but how did they do it? If you look at the traffic below you will see queries to a legit website hosted in China, more specifically in our example because we did not want to be part of attacking New York Ti...
|
|
|
2. Detailed Analysis of the processes and stages of an Exploit Kit - Java and IE exploited by Flashpac
August 11, 2015
Here you can see the webpage that the hackers exploited (arksylhet.com/A67iD4eo/index.html) and inserted within that page an iframe which includes a link to a Javascript Redirect file 2012-09-18 22:41:42.001035 IP 192.168.106.131.1411 > 92.43.108.70.80: Flags [P.], seq 1:395, ack 1, win 6...
|
|
|
3. Massive Distributed Reflection Denial of Service (DrDoS) DoSNETs for hire - NTP, Chargen, SNMP, SSD
August 11, 2015
DDoS attacks with a few thousand infected windows PCs SYN flooding a network have been taking a back seat to the next generation of Denial of Service attacks, known as Distributed Reflection Denial of Service (DrDoS) attacks. A packet kiddie doesn’t even need to compromise servers and PCs anymore to...
|
|
|
4. Examination of a Drive-by-Download Many Security Professionals Get this Wrong – It’s a type of Social Engineering
August 11, 2015
Basic Definition: Drive-by downloads are a type of social engineering which happens when visiting a website and you are prompted for a download without initiating it, when viewing an e-mail message with software that allows javascript to run, by clicking on a deceptive pop-up window that pro...
|
|
|
|
|
|
>
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|