U PDF-u se vidi da su koristili snort.
- +/- sve poruke
- ravni prikaz
- starije poruke gore
U PDF-u se vidi da su koristili snort.
Teški buuuulšit!
"The principal steps of the Chameleon virus are as follows:
1. Establish a list of susceptible APs within the current location.
2. Bypass any encryption security on the AP.
3. Bypass the administrative interface on the AP.
4. Identify and store AP system settings.
5. Replace the AP firmware on vulnerable APs with the virus-loaded firmware.
6. Reload the victim AP system settings.
7. Propagate virus (return to 1)."
Ma da... kao da gledam Nikitu...
U PDF-u se vidi da su koristili snort.
Teški buuuulšit!
"The principal steps of the Chameleon virus are as follows:
1. Establish a list of susceptible APs within the current location.
2. Bypass any encryption security on the AP.
3. Bypass the administrative interface on the AP.
4. Identify and store AP system settings.
5. Replace the AP firmware on vulnerable APs with the virus-loaded firmware.
6. Reload the victim AP system settings.
7. Propagate virus (return to 1)."
Ma da... kao da gledam Nikitu...
Ne razumijem šta tačno želiš reći. Ja, iskreno, čitam vijesti i ne mogu da vjerujem, računalni virus kao živi organizam koji se kreće zrakom (ajmo reći elektromagnetnim valovima). Jel on nekakvu štetu pravi, odakle je krenuo i gdje će se zaustaviti, ima li domaćina, je li parazit ili trojan :D :D :D
Čitam i kao što kažeš kao da gledam Nikitu. :D
Ovo su koraci ovog programa...
1. Establish a list of susceptible APs within the current location.
2. ????
3. Profit
U PDF-u se vidi da su koristili snort.
Teški buuuulšit!
Btw, pogledaj prilog.