Penetration Testing Approach by Mutating Sled of Exploit

碩士 === 中原大學 === 資訊工程研究所 === 96 === A worm is usually used to speedy spread the exploit code to host in the internet, and if it utilizing the encrypting technique, would causes the serious disasters. Since the traditional IDS are not able to detect the shellcode of the encrypted polymorphic worm....

Full description

Bibliographic Details
Main Authors: Ming-Yuan Hsu, 許明淵
Other Authors: Ming-Hour Yang
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/61977630430195970741