Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Hacking Methodology • Chapter 1 21
Wo r ms
If you work with computers, you’re more than likely familiar with the “I
Love You” virus or the “Melissa” virus. Both of these viruses are exam-
ples of worms.The most recent worm attack—named the Anna
Kournikova worm—occurred in February of 2001.The Anna worm was
an e-mail worm created by a 20-year-old Dutch man, who calls himself
“OnTheFly.”The frightening thing about this latest attack using a worm
was that the creator of the worm was not a long-time hacker; he was
relatively new on the scene. OnTheFly used a toolkit known as VBS
Worm Generator, which was created by a hacker known as (k) alamar.
Toolkits are ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312