对不起,为时我的母语不是中文。 我惊讶这个后门没有消费一些租赁的DHCP. 这攻击的成功率增加,但是攻击的检测也增加。 他们有样本的恶意软件为了分析吗?
Sorry, because Chinese is not my native language. I am surprised the backdoor did not consume some of the DHCP leases. This would increase the success rate of the attack, but also increase the attacks detection :/. Does anyone have a malware sample for analysis? 2008/12/4 void <[EMAIL PROTECTED]> > > https://forums.symantec.com/syment/blog/article?blog.id=emerging&thread.id=118 > > 概要: > DHCP劫持 > 类似ARP劫持的手法 > > > ------------------------------ > void > 2008-12-05 > > > > --~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---

