Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Russian Underground 101

Russian Underground 101

Ratings:

5.0

(1)
|Views: 4,682 |Likes:
Published by di24pl

More info:

Published by: di24pl on Nov 13, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/15/2013

pdf

text

original

 
Trend Micro IncorporatedResearch Paper2012
RussianUnderground 101
Max Goncharov
 
PAGE
ii
|
RUSSiAN UNDERGROUND 101
C
ontents
Introduction ...........................................................................................................................................1File Encryption and Crypting Services ............................................................................................1Crypter Prices ...............................................................................................................................2Dedicated Servers................................................................................................................................3Dedicated Server Prices .............................................................................................................3Proxy Servers .......................................................................................................................................3SOCKS Bots ...........................................................................................................................................4VPN Services ........................................................................................................................................5VPN Service Prices ......................................................................................................................5Pay-per-Install Services ......................................................................................................................6Pay-per-Install Service Prices....................................................................................................6Programming Services .......................................................................................................................7Software Sales ..............................................................................................................................7Programming Service Prices .....................................................................................................7Distributed Denial-of-Service Attack Services ..............................................................................8Distributed Denial-of-Service Service Prices .........................................................................8Spamming Services ............................................................................................................................10Spamming Service Prices ..........................................................................................................10Botnets ...................................................................................................................................................11ZeuS ................................................................................................................................................11Botnet Prices ................................................................................................................................12Security Software Checks .................................................................................................................13Security Software Checking Prices .........................................................................................13Trojans ...................................................................................................................................................13Trojan Prices .................................................................................................................................13Rootkits .................................................................................................................................................15Rootkit Prices ...............................................................................................................................15Social Engineering Services .............................................................................................................16Hacking Services .................................................................................................................................16Brute Forcing ................................................................................................................................16Guessing Answers to Secret Questions .................................................................................16Exploiting Website Vulnerabilities ...........................................................................................17SQL Injection.........................................................................................................................17Cross-Site Scripting .............................................................................................................17SQL Injection Cross-Site Scripting ...................................................................................17Using Sniffers, Trojans, Phishing Sites, and Social Engineering ......................................17Hacking Service Prices...............................................................................................................18
 
PAGE
iii
|
RUSSiAN UNDERGROUND 101
 
Scanned Document Copy Sales .......................................................................................................19Scanned Document Copy Prices ..............................................................................................19SMS Fraud Services ............................................................................................................................19SMS Fraud Service Prices ..........................................................................................................19Ransomware Services .......................................................................................................................20Ransomware Service Prices .....................................................................................................20Serial Key Sales ..................................................................................................................................20Exploits ..................................................................................................................................................21Exploit Prices ...............................................................................................................................22Fakes .....................................................................................................................................................23Fake Prices ...................................................................................................................................23Trafc ....................................................................................................................................................23Trafc Prices ................................................................................................................................24Blackhat Search Engine Optimization Services ..........................................................................24Blackhat Search Engine Optimization Service Prices .......................................................25Conclusion ...........................................................................................................................................25Appendix ..............................................................................................................................................26

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
di24pl liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->