Tuesday 29 May 2012


References5
1. Dabirsiaghi, A. January 5, 2008. HTML/CSS Injections – Primitive Malicious
Code. omg.wtf.bbq. Retrieved February 25, 2008 from http://i8jesus.com/?p=10.
2. Dabirsiaghi, A. February 25, 2008. Improving Hackvertor: Polymorphic
JavaScript Payloads. omg.wtf.bbq. Retrieved February 26, 2008 from
http://i8jesus.com/?p=15.
3. F-Secure Corporation, December, 2003. F-Secure Corporation's Data Security
Summary for 2003. Retrieved February 25, 2008 from http://www.fsecure.
com/2003/.
4. Gong, F. March, 2003. Deciphering Detection Techniques. Anomaly-Based
Intrusion Detection. Retrieved February 25, 2008 from
http://www.mcafee.com/us/local_content/white_papers/wp_ddt_anomaly.pdf.
5. Grossman, J. April, 2006. Cross-Site Scripting Worms and Viruses. WhiteHat.
Retrieved February 25, 2008, from http://www.netsecurity.
org/dl/articles/WHXSSThreats.pdf.
6. Grossman, J. November 27, 2007. Inconvenient Truth blog, SE0wN3d!!1.
Retrieved February 27, 2008 from
http://jeremiahgrossman.blogspot.com/2007/11/inconvenient-truth-blogse0wn3d1.
html.
7. Hansen, R. XSS Worm Analysis and Defense. ha.ckers.org. Retrieved February
25, 2008, from http://ha.ckers.org/xss-worms/.
8. Hansen, R. et. al. Creating and Combating the Ultimate XSS Worm.
sla.ckers.org. Retrieved February 25, 2008 from
http://sla.ckers.org/forum/read.php?2,19143.
9. Hansen, R. June 1, 2006. Content restrictions and XSS. ha.ckers.org. Retrieved
February 29, 2008 from http://ha.ckers.org/blog/20060601/content-restrictionsand-
xss/.
10. Heyes, G. January 21, 2008. Code Morphing. The Spanner. Retrieved February
25, 2008 from http://www.businessinfo.co.uk/labs/morph/morph.php.
11. Higgins, K. December 19, 2007. Google's Orkut Social Network Hacked. Dark
Reading. Retrieved February 25, 2008 from
http://www.darkreading.com/document.asp?doc_id=141761&WT.svl=news1_2.
12. Hoffman, B. and Sullivan, B. Ajax Security. Addison-Wesley, 2007.
13. Hoffman, B. April 2, 2007. Jikto in the wild. The HP Security Laboratory.
Retrieved February 27 from
http://portal.spidynamics.com/blogs/spilabs/archive/2007/04/02/Jikto-in-thewild.
aspx.
14. Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D. Protecting Browsers from
DNS Rebinding Attacks. Retrieved February 25, 2008 from
http://crypto.stanford.edu/dns/dns-rebinding.pdf.
15. Kaplan, D. December 5, 2007. Duke University Law School Infiltrated by
Hackers. SC Magazine. Retrieved February 25, 2008 from
http://www.scmagazineus.com/Duke-University-Law-School-website-infiltratedby-
hackers/article/99613/.
16. Kerckhoffs, A. 1883. La Cryptographie Militaire. Journal Des Sciences
Militaires, IX, 5-83, 161-191.
17. Maone, G. NoScript – JavaScript/Java/Flash blocker for a safer Firefox
experience! Retrieved February 25, 2008 from http://noscript.net/.
18. Markham, G. February 24, 2005. Auto-Sizing IFRAMEs? Hacking for Christ.
Retrieved February 25, 2008 from
http://weblogs.mozillazine.org/gerv/archives/007610.html.
19. Rhodes, K. August 29, 2001. Code Red, Code Red II, and SirCam Attacks
Highlight Need for Proactive Measures. United States General Accounting
Office. Retrieved February 25, 2008 from
http://www.gao.gov/new.items/d011073t.pdf.
20. Sirdarkcat. November 8, 2007. Inside History of hacking rsnake for fun and
pagerank. SIRDARKCAT: Security and Programming Blog. Retrieved February
25, 2008 from http://sirdarckcat.blogspot.com/2007/11/inside-history-of-hackingrsnake-
for.html.
21. Sutton, Michael. December 31, 2006. Web Application Security Statistics. Web
Application Security Consortium. Retrieved February 25, 2008 from
http://www.webappsec.org/projects/statistics.
22. Unknown. Spam Mimic .Retrieved February 25, 2008, from
http://www.spammimic.com.
23. Valotta, R. Nduja Connection. Retrieved February 25, 2008 from
http://rosario.valotta.googlepages.com/home.
24. Veness, C. SHA-1 Cryptographic Hash Algorithm. Movable Type Scripts.
Retrieved February 25, 2008 from http://www.movabletype.
co.uk/scripts/sha1.html.
25. Zhou, Y., Cui X., Wu, B. Worm Poisoning Technology and Application.
CNCERT/CC. Retrieved February 27, 2008 from
http://www.first.org/conference/2006/papers/xiang-cui-papers.pdf.
26. Spafford, E. The Internet Worm Program: An Analysis. Purdue Technical Report
CSD-TR-823. Department of Computer Sciences, Purdue University. Retrieved

No comments:

Post a Comment