O'Reilly logo

Crimeware by Zulfikar Ramzan, Markus Jakobsson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Footnotes

Chapter 1

1 SMTP is the standard protocol for mail transmission over the Internet.

2 Botnets can be used to carry out a plethora of malicious activities; they are discussed in greater detail in Chapter 7.

3 A more detailed exposition on pharming can be found in the text edited by Jakobsson and Myers [202].

4 A rootkit is a component that uses various stealthing techniques to mask its presence on a machine. Rootkits are discussed in greater detail in Chapter 8.

5 Informally, the attack surface of a system refers to the different mechanisms by which an attacker can attack (and potentially compromise or damage) the system.

6 http://insecure.org/nmap

Chapter 2

* Parts of this chapter appeared in [424] and parts have been adapted from

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required