W.32Downadup.C, the third variant of the Conficker virus is more aggressive and trying to be stealth by disabling the security software installed on the machine. The new variant is focusing more on how to hide itself than on spreading to more computer. It uses and improved algorithm which generates more than 500,000 random domains per day to download the payload. The previous version generated only 250 per day which was successfully reversed engineered by the Microsoft.

Conficker will try every three hours to connect to specific domains over HTTP (‘phoning home’) however, unlike many other worms which use a static list of domains, Conficker’s domain list is dynamically generated by an algorithm to download the payload. It’s still a mystery that no payload has yet to be delivered by the worm even after having more than 16 million PCs infected world wide.

Explore More

Learning exploit development in short time! by Myne-us

Last week, we discussed about vulnerability analysis, exploit writing and being able to circumvent popular exploit mitigation techniques, to drive into it you do need to understand hardware/software/network. If you’re

Log Poisoning

Log poisoning is a technique that not many know about. this technique works only if you can make an LFI of the page. if we say that you call index.php,

BackTrack 5 R3 Release – Aug 13th, 2012

The BackTrack Development team will be releasing an R3 revision of our Penetration Testing distribution in 2 weeks. This release focuses on bugfixes and over 50 new tool additions –