Home page logo

pen-test logo Penetration Testing mailing list archives

Malicious cryptography
From: Erin Carroll <amoeba () amoebazone com>
Date: Tue, 9 May 2006 15:34:02 -0400 (EDT)

The following Infocus technical article was published on SecurityFocus 

Malicious cryptography, part 1

This two-part article series looks at how cryptography is a double-edged 
sword: it is used to make us safer, but it is also being used for 
malicious purposes within sophisticated viruses. Part one introduces the 
concepts behind cryptovirology and offers examples of malicious 
potential with the SuckIt rootkit and a possible SSH worm. It then 
introduces armored viruses that use shape shifting (polymorphism and 
metamorphism) to avoid detection.

By Frederic Raynal


This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.

  By Date           By Thread  

Current thread:
  • Malicious cryptography Erin Carroll (May 10)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]