对不起,为时我的母语不是中文。

我惊讶这个后门没有消费一些租赁的DHCP.
这攻击的成功率增加,但是攻击的检测也增加。
他们有样本的恶意软件为了分析吗?


Sorry, because Chinese is not my native language.

I am surprised the backdoor did not consume some of the DHCP leases.
This would increase the success rate of the attack, but also increase
the attacks detection :/.  Does anyone have a malware sample for analysis?

2008/12/4 void <[EMAIL PROTECTED]>

>
> https://forums.symantec.com/syment/blog/article?blog.id=emerging&thread.id=118
>
> 概要:
> DHCP劫持
> 类似ARP劫持的手法
>
>
>  ------------------------------
>  void
> 2008-12-05
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

回复