A Hacker Caught During Malware Analysis

0
Today, while I am analyzing one of the sample that I found it very suspicious, I found SMTP username and password of the malware writer. And I decided to share the...

Detecting and Blocking DNS Tunneling

1
Detecting and Blocking DNS Tunneling DNS (Domain Name System) is the protocol which is composed of hierarchical and dynamic database and it provides us IP addresses, text records, mail exchange information (MX records), name...

BGP-Targeted DoS Attacks

3
BGP-Targeted DoS Attack Can Disrupt Internet Routing Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway Protocol's concepts and...

Savunma Sanayii Firmaları ve Finansal Kuruluşları Hedef Alan Zararlı İncelemesi

0
GIB şablonu kullanılarak savunma sanayii firmaları ve finansal kuruluşları hedef alan, zararlı içerik barındıran e-postalar gönderilmektedir. Göndericinin "posta*@gelirler.gov.tr" olması, mail içeriğinin inandırıcılık açısından oldukça başarılı olması, düzgün bir Türkçe ile hazırlanması ve...

Snmp Amplification DDOS Attack

1
Approaching Danger; Snmp Amplification DDOS Attacks  SNMP (Simple Network Management Protocol) is the protocol which is used for monitoring the instant traffic data, gathering information and changing the configuration of the devices,...

Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS

0
Remote Triggered Black Hole (RTBH) Routing to Mitigate DDOS Border Gateway Protocol (BGP) is the protocol, which is designed to share routing, reachability and some other information among autonomous systems (AS). Border Gateway...

BlackNurse Denial of Service Attack

1
BlackNurse Denial of Service Attack "Remember the days back in the 90s when you could cripple someones Internet connection simply by issuing a few PING command like “ping -t ”? This type...

How to Misuse SMB Activities

1
The SMB Protocol (Server Message ) is the protocol which is used for sharing file and print resources between machines and also that allows applications on a computer to read and write to...

Dns Amplification DDOS Attacks

1
Dns Amplification Attacks and How Much Vulnerable We are as A Country Last week, I talked about one of the misuse type of DNS protocol is DNS tunneling. Today, I am going to...