The Latest in IT Security

Posts Tagged ‘breakpoint’

The exploit Used environment: Windows XP SP3 with Adobe Acrobat 9.4.6 This U3D memory corruption vulnerability (CVE-2011-2462) could cause an application crash and potentially allow an attacker to take control of the affected system. After the malicious PDF file is opened, new process pretty.exe (this file is changed all the times.) is created. We can […]

Read more ...

In previous post, my colleague talked about new way to inject virus codes into other normal processes in order to bypass firewall’s detection. During the continuous research of ZeroAccess, we found there’re some improvements for this series of anti-detection and anti-debug methods. And what’s most interesting is ZeroAccess seems to really like lsass.exe. It often […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments