19 min

These Hackers Snuck their Trojan through PING The Backend Engineering Show with Hussein Nasser

    • Technology

In this video, I’ll discuss the Pingback attack, a new clever attack that uses both DLL files through Oracle Component Interface (OCI.dll) and ICMP protocol to deliver commands between the victim machines and the command center. 



Resources 

https://thehackernews.com/2021/05/new-pingback-malware-using-icmp.html 

https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol 

https://en.wikipedia.org/wiki/Oracle_Call_Interface



Support my work on PayPal

https://bit.ly/33ENps4

Become a Member on YouTube

https://www.youtube.com/channel/UC_ML5xP23TOWKUcc-oAE_Eg/join

🧑‍🏫 Courses I Teach

https://husseinnasser.com/courses

In this video, I’ll discuss the Pingback attack, a new clever attack that uses both DLL files through Oracle Component Interface (OCI.dll) and ICMP protocol to deliver commands between the victim machines and the command center. 



Resources 

https://thehackernews.com/2021/05/new-pingback-malware-using-icmp.html 

https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol 

https://en.wikipedia.org/wiki/Oracle_Call_Interface



Support my work on PayPal

https://bit.ly/33ENps4

Become a Member on YouTube

https://www.youtube.com/channel/UC_ML5xP23TOWKUcc-oAE_Eg/join

🧑‍🏫 Courses I Teach

https://husseinnasser.com/courses

19 min

Top Podcasts In Technology

Smashing Security
Graham Cluley & Carole Theriault
TikTok
Catarina Vieira
7 Minute Security
Brian Johnson
Lex Fridman Podcast
Lex Fridman
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
PodRocket - A web development podcast from LogRocket
LogRocket