: Top To Bottom Breakdown: From Injected Code to Malcode Analysis

09.12.2008, 13:10
In the labs we keep a close eye on malicious injected code to legitimate Web sites, as ThreatSeeker monitors dynamically thousands of those every day. Keeping such a close eye on things reveals, from time to time, interesting findings. Last week we found a low perimeter attack of such injected code, which, as a whole, looked like a good case study. In this blog, were going to take a look at an injected attack from top to bottom; well achieve this by dissecting the injected code, analyzing the payload site, and doing some malcode analysis on the resulting dropped malware.
further http://securitylabs.websense.com/content/Blogs/3239.aspx