𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Chinese cyber-attack tools continue to evolve

✍ Scribed by Dennis Dwyer


Book ID
104392671
Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
656 KB
Volume
2009
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


We believe these statistics are significant because it clearly shows that the United States, as well as China, has a lot of vulnerable computers that have been compromised and are being used as bots to launch cyber attacks. And although some of these bots could certainly be controlled by hackers outside of China, there are numerous instances where Chinese hackers will compromise large networks within their own country and use them as bots to attack other organisations. For example, entire university networks in China will belong to local hacker groups. With the growth of cyber-crime comes the increase of new cyber-tools. The level of sophistication and capabilities of Chinese-authored exploit toolkits are increasing rapidly, and cannot be ignored.

In this article, we are exploring a Chinese toolkit called 'Leopard in a Hole' obtained from a source in China. We have seen price quotes for this tool range from $20 to $500.

According to the tool's author, the purpose of the tool is to aid penetration testers in identifying and exploiting SQL injection flaws. This article will demonstrate the tool from an attacker's perspective, as an unscrupulous user may decide to use the tool for any purpose he or she deems fit.