HOME | E-MAIL | SUPPORT | | SIGN UP

product demo video company contact

Thank you for your vote!

Dynamic Code Dumping And Patching


          ratings

10046 views



Attack Scenarios

Keystroke and Mouse Logging

This video shows how to retrieve personal and transaction information using the mouse and keyboard logging attack vectors.

Session Hijacking

In this video we describe how a Hacker can hijack an active browsing session.

Keystroke and Event Emulation

In this video we showcase a very common attack scenario which uses the keystroke and mouse event emulation attack vectors.

Window Overlay and Event Emulation

In this video we describe a powerful attack scenario which combines the event emulation and window overlay attack vectors.

Dynamic Code Dumping And Patching

This Video describes an attack whereby malware uses DLL-injection techniques to modify the details of a Web browser transaction.

Static Code Dumping & Patching

This Video describes an attack whereby a hacker replaces a standard web browser's files with a modified version of the executable code.

Social Engineering & Interface Manipulation

In this Attack, the Hackers target an out-of-band transaction validation method implemented with the use of the ZTIC device.

mTan & OOB Methods

In this video, we show the vulnerability of out-of-band (OOB) transaction validation techniques, and in particular mTan methods.

PDF Form Spoofing

This scenario describes a targeted attack against form filling and digital signing using PDF Reader.

Screen Capturing

This Attack Scenario describes how hackers can obtain valuable information by screen capturing the data shown on the display of the PC.

Promotion Videos

H-Browser Promo Video

A short video of strong visual impact for introducing the product slogan. Let us know if you like it!

CLX.Sentinel Promo

A promotional video introducing the CLX.Sentinel, the first e-banking product featuring the H-Browser.

Presentations

A Power Point presentation with audio commentary by Dr. Ronchi on the H-Browser technology framework.






Dynamic Code Dumping And Patching

This Video describes an attack whereby malware uses DLL-injection techniques to modify the details of a Web browser transaction.The malware gains access to the computer’s memory,locates the Web browser’s process and injects new code in the process in order to change the transaction data on the fly.


© 2002 — 2014 EISST LTD - Enterprise Information Security Systems & Technologies.

Access to this file is free after you Login or Signup

Login:
Password:
I fogot my login or password