Vulnerabilidades em Aplicações Web: uma Análise Baseada nos Dados Coletados em Honeypots
Resumo
Este artigo não possui resumo.Referências
Mavrommatis P. and Provos N. (2008). Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (USENIX).
Holz, T., Marechal, S. and Raynal, F. (2006). New threats and attacks on the World Wide Web. In: IEEE Security & Privacy Magazine.
Zou, C., Weibo G.; Towsley, D. and Lixin G. (2005). The monitoring and early detection of Internet worms, In: IEEE/ACM Transactions on Networking.
Levy, E. (2005). Worm propagation and generic attacks. In: Security & Privacy Magazine.
PHP-SHELL (2008). Remote administration tool. http://phpshell.sourceforge.net.
PHP-SYSINFO (2008). PHP system information. http://phpsysinfo.sourceforge.net.
SQUIRRELMAIL (2008). WebMail SquirrelMail. http://www.squirrelmail.org.
PHP.HoP (2008). PHP HoneyPot Project. http://www.rstack.org/phphop.
PHPBB (2008). PHPBB forum system. http://www.phpbb.com.
PHPMYADMIN (2008). Database administration tool. http://www.phpmyadmin.net.
Holz, T., Marechal, S. and Raynal, F. (2006). New threats and attacks on the World Wide Web. In: IEEE Security & Privacy Magazine.
Zou, C., Weibo G.; Towsley, D. and Lixin G. (2005). The monitoring and early detection of Internet worms, In: IEEE/ACM Transactions on Networking.
Levy, E. (2005). Worm propagation and generic attacks. In: Security & Privacy Magazine.
PHP-SHELL (2008). Remote administration tool. http://phpshell.sourceforge.net.
PHP-SYSINFO (2008). PHP system information. http://phpsysinfo.sourceforge.net.
SQUIRRELMAIL (2008). WebMail SquirrelMail. http://www.squirrelmail.org.
PHP.HoP (2008). PHP HoneyPot Project. http://www.rstack.org/phphop.
PHPBB (2008). PHPBB forum system. http://www.phpbb.com.
PHPMYADMIN (2008). Database administration tool. http://www.phpmyadmin.net.
Publicado
01/09/2008
Como Citar
CERON, João M.; FAGUNDES, Leonardo L.; LUDWIG, Glauco A.; TAROUCO, Liane; BERTHOLDO, Leandro.
Vulnerabilidades em Aplicações Web: uma Análise Baseada nos Dados Coletados em Honeypots. In: RESUMOS ESTENDIDOS - SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 8. , 2008, Gramado/RS.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2008
.
p. 277-278.
DOI: https://doi.org/10.5753/sbseg_estendido.2008.20912.