Hi Sridhar,
As far as i know, u have to go thru the whole code because a
trojan/backdoor
can be embedded into code very cleverly ;-) and even experts might not be
able to detect it!
what i wud do if i were in ur case wud be to go thru the source code of
some
trojans/backdoors[there are many a
Hi people,
I've been going through some articles on how to write secure code esp.
from: http://www.shmoo.com/securecode/
I am looking for something more specific for the windows platform. Are
there any specific guidelines/standards that one could follow?
And one more thing... Is it possible
to
Try using Whisker from RFP.
http://www.wiretrip.net/rfp
Some others i wud prefer wud be:
nmap http://www.insecure.org/nmap/
foundscan http://www.foundstone.com/
Stealth HTTP Scanner http://www.hideaway.net/
Regards,
Rahul C. Kashyap
www.nsecure.net
---
Layered Defence
-
Hi,
Pradeep try using fport v1.1.
also check out pslist from Mark Russinovich's sysinternals site, the recent
proclist.exe available at checksum.org is also a good one.
hope that this helps
regards,
rck
- Original Message -
From: "R Pradeep Chandran" <[EMAIL PROTECTED]>
To: "Francisco Bedo