Home >> Linux >> Neutrino Exploit Kit Has a New Way To Detect Security Researchers

Neutrino Exploit Kit Has a New Way To Detect Security Researchers

itwbennett writes: [The Neutrino exploit kit] is using passive OS fingerprinting to detect visiting Linux machines, according to Trustwave researchers who found that computers they were using for research couldn’t make a connection with servers that delivered Neutrino. Daniel Chechik, senior security researcher at Trustwave’s SpiderLabs division wrote that they tried changing IP addresses and Web browsers to avoid whatever was causing the Neutrino server to not respond, but it didn’t work. But by fiddling with some data traffic that Trustwave’s computers were sending to the Neutrino server, they figured out what was going on.


Share on Google+

Read more of this story at Slashdot.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

*