Penetration Testing - A Structured Approach by: TheStare
Provide a meaningful perspective regarding penetration testing service.
The Waledac Botnet by: Bandit
Before its eventual take down the Waledac botnet consisted of an estimated 70,000-90,000 computers infected with the "Waledac" computer worm. The botnet itself was capable of sending about 1.5 billion spam messages a day, or about 1% of the total global spam volume.
Unconventional Privilige Escalation by: Tikbalang
Traditional ways are scanning targets for information, finding vulnerability and exploits available. At times MITM attacks, rootkits, keyloggers and the old school Back Orifice are used to elevate privilege.