Jump to content

Java vulnerabilities


Recommended Posts

MBAM has 3 chances to kill an exploit :

1. IP the infected site is on

2. IP the exploit draws payload from (usually off of the main site as infecting a page is easy to hide , adding files to a server is not) .

3. the actual payload

Exploits also often make multiple hops to obscure the final payload . Each hop is a chance for IP blocking to break the infection attempt .

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.