Articles Blog | G5 Cyber Security

Research – Exploring Below The Surface Of The GIFAR Iceberg

Get the Whitepaper called Exploring Below the Surface of the GIFAR Iceberg. Reported at Black Hat 2008, GIFARs uses the concept of combining files such as a GIF images and a Java Archives (JAR) to enable malicious code execution. This paper explores GIFARs and the possible threats they expose.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/76472/GIFAR-iceberg.pdf

Source: https://packetstormsecurity.com/files/76472/Exploring-Below-The-Surface-Of-The-GIFAR-Iceberg.html

Exit mobile version