Overview
Syllabus
Intro
Break Down
Collecting data
Trend data sets
Attacks!
Specific attacks against software
Life-cycle of an exploit
Theory about this trend...
PHP-CGI remote code execution
Attack Response
Attack sources
A little about incident response
Response breakdown
Standard approach
Auditing nitty gritty
File System Monitoring
Using find to cleanup
Attacker Motivation
Example.htaccess infection
Registrars
IP address
Backdoor evolution
Collection
Getting backdoors from attack logs
Dead Simple
Base64 decode
Regex revenge
Variables as functions
Backdoor Conclusions
Further Reading