IDS mailing list archives

HTTP based trojans


From: AQBARROS () BKB com br
Date: Thu, 31 Oct 2002 09:46:38 -0300

As I saw on the last messages about detecting trojans through flow-based
analysis, I thought if someone already made anything to detect trojans that
use Internet Explorer controls to communicate with the client, even on
networks that allow only proxied (even authenticated) http connections. Did
anyone try to do such kind of thing?

Regards,


Augusto.


Current thread: