<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Y2h4ck</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Y2h4ck"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Y2h4ck"/>
		<updated>2026-04-26T15:31:20Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33363</id>
		<title>Spyware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33363"/>
				<updated>2008-07-03T16:58:18Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The spyware is a program that captures statistic information from user´s computer and sends it over internet without user acceptance. This information is usually obtained from cookies and web browser’s history. The spyware can also install other software, display advertisement, or redirect the web browser activity.&lt;br /&gt;
A spyware differs from virus, worm and adware from various ways. The spyware does not self-replicate and distribute like virus and worm, and not necessarily displays advertisements like adware. The common characteristics between spyware and virus, worm, and adware are:&lt;br /&gt;
&lt;br /&gt;
1.	exploitation of infected computer for commercial purposes&lt;br /&gt;
&lt;br /&gt;
2.	the display, in some cases, of advertisements&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
Some Spywares are very dificult to remove because they can hide they-selfs into Browser Cookies and Offline HTML Content in Temporary files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Example ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/6/68/Figura2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. A lot of toolbars added by spyware, and some working as spyware&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/506.html -  Malicious&lt;br /&gt;
*http://en.wikipedia.org/wiki/Spyware - Spyware&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Trojan Horse]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[:Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33361</id>
		<title>Spyware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33361"/>
				<updated>2008-07-03T16:57:27Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The spyware is a program that captures statistic information from user´s computer and sends it over internet without user acceptance. This information is usually obtained from cookies and web browser’s history. The spyware can also install other software, display advertisement, or redirect the web browser activity.&lt;br /&gt;
A spyware differs from virus, worm and adware from various ways. The spyware does not self-replicate and distribute like virus and worm, and not necessarily displays advertisements like adware. The common characteristics between spyware and virus, worm, and adware are:&lt;br /&gt;
&lt;br /&gt;
1.	exploitation of infected computer for commercial purposes&lt;br /&gt;
&lt;br /&gt;
2.	the display, in some cases, of advertisements&lt;br /&gt;
&lt;br /&gt;
The spyware is usually masqueraded or presented as an utility software like P2P client, optimization tool, web accelerator, download accelerator, and even as security software like antispyware. In this case the user infects the computer by installing this kind of software without being aware of the danger. The spyware can also be bundled in media and shareware, being additionally installed with the software or autorun. The infection can occurs through fake Windows warning, when the fake message appears warning the user about some security issue or offering performance optimizing.&lt;br /&gt;
The computer infected presents symptoms like poor performance due to high memory and processor usage, unwanted behavior, system crash, high internet bandwidth usage, large number of popup, and many other symptoms.&lt;br /&gt;
The biggest problem is that the infected computer becomes extremely vulnerable to many other spywares, which install themselves into the computer.&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
Some Spywares are very dificult to remove because they can hide they-selfs into Browser Cookies and Offline HTML Content in Temporary files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Example ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/6/68/Figura2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. A lot of toolbars added by spyware, and some working as spyware&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/506.html -  Malicious&lt;br /&gt;
*http://en.wikipedia.org/wiki/Spyware - Spyware&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Trojan Horse]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[:Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33360</id>
		<title>Spyware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33360"/>
				<updated>2008-07-03T16:55:23Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The spyware is a program that captures statistic information from user´s computer and sends it over internet without user acceptance. This information is usually obtained from cookies and web browser’s history. The spyware can also install other software, display advertisement, or redirect the web browser activity.&lt;br /&gt;
A spyware differs from virus, worm and adware from various ways. The spyware does not self-replicate and distribute like virus and worm, and not necessarily displays advertisements like adware. The common characteristics between spyware and virus, worm, and adware are:&lt;br /&gt;
&lt;br /&gt;
1.	exploitation of infected computer for commercial purposes&lt;br /&gt;
&lt;br /&gt;
2.	the display, in some cases, of advertisements&lt;br /&gt;
&lt;br /&gt;
The spyware is usually masqueraded or presented as an utility software like P2P client, optimization tool, web accelerator, download accelerator, and even as security software like antispyware. In this case the user infects the computer by installing this kind of software without being aware of the danger. The spyware can also be bundled in media and shareware, being additionally installed with the software or autorun. The infection can occurs through fake Windows warning, when the fake message appears warning the user about some security issue or offering performance optimizing.&lt;br /&gt;
The computer infected presents symptoms like poor performance due to high memory and processor usage, unwanted behavior, system crash, high internet bandwidth usage, large number of popup, and many other symptoms.&lt;br /&gt;
The biggest problem is that the infected computer becomes extremely vulnerable to many other spywares, which install themselves into the computer.&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
Some Spywares are very dificult to remove because they can hide they-selfs into Browser Cookies and Offline HTML Content in Temporary files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Example ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/6/68/Figura2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. A lot of toolbars added by spyware, and some working as spyware&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/506.html -  Malicious&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Trojan Horse]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[:Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33359</id>
		<title>Spyware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Spyware&amp;diff=33359"/>
				<updated>2008-07-03T16:55:08Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* Severity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The spyware is a program that captures statistic information from user´s computer and sends it over internet without user acceptance. This information is usually obtained from cookies and web browser’s history. The spyware can also install other software, display advertisement, or redirect the web browser activity.&lt;br /&gt;
A spyware differs from virus, worm and adware from various ways. The spyware does not self-replicate and distribute like virus and worm, and not necessarily displays advertisements like adware. The common characteristics between spyware and virus, worm, and adware are:&lt;br /&gt;
&lt;br /&gt;
1.	exploitation of infected computer for commercial purposes&lt;br /&gt;
&lt;br /&gt;
2.	the display, in some cases, of advertisements&lt;br /&gt;
&lt;br /&gt;
The spyware is usually masqueraded or presented as an utility software like P2P client, optimization tool, web accelerator, download accelerator, and even as security software like antispyware. In this case the user infects the computer by installing this kind of software without being aware of the danger. The spyware can also be bundled in media and shareware, being additionally installed with the software or autorun. The infection can occurs through fake Windows warning, when the fake message appears warning the user about some security issue or offering performance optimizing.&lt;br /&gt;
The computer infected presents symptoms like poor performance due to high memory and processor usage, unwanted behavior, system crash, high internet bandwidth usage, large number of popup, and many other symptoms.&lt;br /&gt;
The biggest problem is that the infected computer becomes extremely vulnerable to many other spywares, which install themselves into the computer.&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
Some Spywares are very dificult to remove because they can hide they-selfs into Browser Cookies and Offline HTML Content in Temporary files.&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
==Example ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/6/68/Figura2.jpg&lt;br /&gt;
&lt;br /&gt;
Figure 1. A lot of toolbars added by spyware, and some working as spyware&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
&lt;br /&gt;
*http://cwe.mitre.org/data/definitions/506.html -  Malicious&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Trojan Horse]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
* [[:Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33357</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33357"/>
				<updated>2008-07-03T16:48:22Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan Horse is a program that uses malicious code masqueraded as a trusted applications. The malicious code can be injected on benign applications, masqueraded in e-mails links or sometimes hidden in JavaScript  pages to make furtive attacks against vulnerable internet Browsers.&lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
A Trojan horse can break througt all the security polices in a network, because a attacker can&lt;br /&gt;
get access to a WorkStation that can have network credentials stored in. With this credentials a &lt;br /&gt;
attacker can compromise all the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33356</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33356"/>
				<updated>2008-07-03T16:47:17Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan Horse is a program that uses malicious code masqueraded as a trusted applications. The malicious code can be injected on benign applications, masqueraded in e-mails links or sometimes hidden in JavaScript  pages to make furtive attacks against vulnerable internet Browsers.&lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
A Trojan horse can break througt all the security polices in a network, because a attacker can&lt;br /&gt;
get access to a WorkStation that can have network credentials stored in. With this credentials a &lt;br /&gt;
attacker can compromise all the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33355</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=33355"/>
				<updated>2008-07-03T16:45:59Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan Horse is a program that uses malicious code masqueraded as a trusted applications. The malicious code can be injected on benign applications, masqueraded in e-mails links or sometimes hidden in JavaScript  pages to make furtive attacks against vulnerable internet Browsers.&lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
A Trojan horse can break througt all the security polices in a network, because a attacker can&lt;br /&gt;
get access to a WorkStation that can have network credentials stored in. With this credentials a &lt;br /&gt;
attacker can compromise all the network.&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=29703</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=29703"/>
				<updated>2008-05-22T20:47:50Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* Severity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan Horse is a program that uses malicious code masqueraded as a trusted applications. The malicious code can be injected on benign applications, masqueraded in e-mails links or sometimes hidden in JavaScript  pages to make furtive attacks against vulnerable internet Browsers.&lt;br /&gt;
&lt;br /&gt;
A Trojan horse is a program that uses malicious code masqueraded as a benign application. The term derives from the myth of the Greek Trojan Horse on the Trojan War. The malicious code can be injected on legitimate software to be installed by victim, or the supposed benign program itself can be the Trojan horse. The victim is usually tricked to open the Trojan horse because it appears to be received from a legitimate source.&lt;br /&gt;
This kind of malware looks and acts like a virus, but the difference resides on the fact that Trojan horse does not self-replicate. The infected computer experience many different symptoms similar to virus, as background configuration auto changing, mouse buttons function reversing, system crashes, the famous blue screen, computer reboots itself, Ctrl + Alt + Del stops working, and many other symptoms described later in this document.&lt;br /&gt;
The ultimate Trojan horse uses javascript to make furtive attack, free of antimalware intervention and users interception, normally used on attacks against internet banking transactions on-the-fly, resulting victim´s financial loss. &lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
== Risk Factor ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
A Trojan horse can break througt all the security polices in a network, because a attacker can&lt;br /&gt;
get access to a WorkStation that can have network credentials stored in. With this credentials a &lt;br /&gt;
attacker can compromise all the network.&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=29702</id>
		<title>Trojan Horse</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Trojan_Horse&amp;diff=29702"/>
				<updated>2008-05-22T20:40:27Z</updated>
		
		<summary type="html">&lt;p&gt;Y2h4ck: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A Trojan Horse is a program that uses malicious code masqueraded as a trusted applications. The malicious code can be injected on benign applications, masqueraded in e-mails links or sometimes hidden in JavaScript  pages to make furtive attacks against vulnerable internet Browsers.&lt;br /&gt;
&lt;br /&gt;
A Trojan horse is a program that uses malicious code masqueraded as a benign application. The term derives from the myth of the Greek Trojan Horse on the Trojan War. The malicious code can be injected on legitimate software to be installed by victim, or the supposed benign program itself can be the Trojan horse. The victim is usually tricked to open the Trojan horse because it appears to be received from a legitimate source.&lt;br /&gt;
This kind of malware looks and acts like a virus, but the difference resides on the fact that Trojan horse does not self-replicate. The infected computer experience many different symptoms similar to virus, as background configuration auto changing, mouse buttons function reversing, system crashes, the famous blue screen, computer reboots itself, Ctrl + Alt + Del stops working, and many other symptoms described later in this document.&lt;br /&gt;
The ultimate Trojan horse uses javascript to make furtive attack, free of antimalware intervention and users interception, normally used on attacks against internet banking transactions on-the-fly, resulting victim´s financial loss. &lt;br /&gt;
&lt;br /&gt;
Other details can be found on [[Man-in-the-browser attack]].&lt;br /&gt;
&lt;br /&gt;
'''The 7 main types of Trojan Horse'''&lt;br /&gt;
&lt;br /&gt;
1.Remote Access Trojan (RAT)&lt;br /&gt;
&lt;br /&gt;
Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. &lt;br /&gt;
&lt;br /&gt;
2.Data Sending Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses keylogger technology to capture sensitive data like passwords, credit card and banking information, IM messages, and send back to attacker.&lt;br /&gt;
&lt;br /&gt;
3.Destructive Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to destroy data stored on victim’s computer.&lt;br /&gt;
&lt;br /&gt;
4.Proxy Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse that uses the victim´s computer as a proxy server, providing attacker opportunity to execute illicit acts from the infected computer, like banking fraud, and even malicious attacks over the internet.&lt;br /&gt;
&lt;br /&gt;
5.FTP Trojan&lt;br /&gt;
&lt;br /&gt;
This type of Trojan horse uses the port 21 to enable the attackers to connect to the victim´s computer using File Transfer Protocol.&lt;br /&gt;
&lt;br /&gt;
6.Security software disabler Trojan&lt;br /&gt;
&lt;br /&gt;
The Trojan horse is designed to disable security software like firewall and antivirus, enabling the attacker to use many invasion techniques to invade the victim´s computer, and even to infect more the computer.&lt;br /&gt;
&lt;br /&gt;
7.Denial-of-Service attack Trojan&lt;br /&gt;
&lt;br /&gt;
Trojan horse designed to give the attacker opportunity to realize Denial-of-Service attacks from victim´s computer.&lt;br /&gt;
&lt;br /&gt;
'''Symptoms'''&lt;br /&gt;
&lt;br /&gt;
A list of common symptoms is described in this section.&lt;br /&gt;
&lt;br /&gt;
•Wallpaper and other background settings auto changing&lt;br /&gt;
&lt;br /&gt;
•Mouse pointer disappear&lt;br /&gt;
&lt;br /&gt;
•Programs auto loading and unloading&lt;br /&gt;
&lt;br /&gt;
•Strange windows warnings, messages and question box, and options being displayed constantly&lt;br /&gt;
&lt;br /&gt;
•e-mail client auto sending messages to all user´s contacts list&lt;br /&gt;
&lt;br /&gt;
•Windows auto closing&lt;br /&gt;
&lt;br /&gt;
•System auto rebooting&lt;br /&gt;
&lt;br /&gt;
•Internet accounts information changing&lt;br /&gt;
&lt;br /&gt;
•High internet bandwidth being used without user action&lt;br /&gt;
&lt;br /&gt;
•Computer´s high resources consumption (computer slows down)&lt;br /&gt;
&lt;br /&gt;
•Ctrl + Alt + Del stops working&lt;br /&gt;
&lt;br /&gt;
== Severity ==&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
== Likelihood of exploitation ==&lt;br /&gt;
&lt;br /&gt;
Medium to High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
A Javascript Trojan Horse example can be found on: http://www.attacklabs.com/download/sniffer.rar .&lt;br /&gt;
&lt;br /&gt;
An iframe pointing to a javascript which downloads malware: http://isc.sans.org/diary.html?storyid=2923&amp;amp;dshield=4c501ba0d99f5168ce114d3a3feab567&lt;br /&gt;
&lt;br /&gt;
== External References==&lt;br /&gt;
&lt;br /&gt;
*[[http://myappsecurity.blogspot.com/2007/01/ajax-sniffer-prrof-of-concept.html | Ajax Sniffer]]&lt;br /&gt;
&lt;br /&gt;
*[[http://hacker-eliminator.com/trojansymptoms.html | Trojan Infection Symptoms]]&lt;br /&gt;
&lt;br /&gt;
*[[http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp | The Difference Between a Virus, Worm and Trojan Horse]]&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
*[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Phishing]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malicious Code Attack]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>Y2h4ck</name></author>	</entry>

	</feed>