Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Miscellaneous-> Group Releases » The December Storm of WMF : Preparation, Identification, and Containment of Exploits

This Directory TOP
BlueBug 2.0
Internet Protocol Event Reporting
Atsiv v1.01
hydra-5.3-src.tar.gz
thc-ts201.zip
Contact ID Protocol for ASC
Hacking World of Warcraft (WoW) - slides
Homemade GPS Jammer
JanusVM - Internet Privacy Appliance
Creating a Bootable USB Ophcrack
Top 10 WordPress Anti Spam Plugins
Zune DRM Stripper
Modifications for Stopping phpBB Forum Spambots
New York City Hackers - video
Cracking Vista Beta 2 Local Passwords
China Finder 2.4
Hacked Chip and PIN Terminal Video
Days of Risk in 2006 : Linux, Mac OS X, Solaris and Windows
Video: Exploring Metasploit 3 and the New and Improved Web Interface - Part 1
Tutorial : Rainbow Tables and RainbowCrack
New Security Features in Internet Explorer 7 - Video
Securing Communications with SSL/TLS : A High-Level Overview
The Lazy Guide to Installing Knoppix on a USB Key
Entering A Safe Mirror When Logging In With Unionfs And Chroot
Compromise from a Word Zero Day Vulnerability - Video
Metasploit Framework v3.0 Beta 1
How to Hack into a Windows XP Computer Without Changing Password
Setting up a Simple Web Proxy with CGIProxy - Video
Driver Sweeper 3.2.0
A Video Tutorial on Cracking MD5 Password Hashes
Video - Using Dariks Boot and Nuke (DBAN) to Totally Wipe a Drive
How To Become Invisible To A GPS Tracker
Search

The December Storm of WMF : Preparation, Identification, and Containment of Exploits

File Size: KB
Developer: http://www.sans.org/reading_room/
Description:     This paper (74 PAGES) will look how and when the vulnerability was discovered and made public. It will identify the actors in the security community and examine how they responded. These actors include Microsoft, the vendor of the vulnerable product, of course, but also anti-malware companies like Internet Security Systems (ISS), Symantec, McAfee, and F-secure, and noncommercial analysts like the volunteers of the Internet Storm Center (ISC).
Download:   The December Storm of WMF : Preparation, Identification, and Containment of Exploits

 

Sponsor Links

Sponsor Links

Share/Bookmark