Potentially Infected (java driveby) - GNU/Linux
Users browsing this thread: 1 Guest(s)
|
|||
So, I'm potentially infected by a java driveby. I accessed a webpage in iceweasel containing the malicious code without running noscript. To the best of my knowledge, if the skid who owned the website configured it to target GNU/Linux, it could very effectively, but he only had it configured to target Windows.
How can I check to make sure I am secure and not infected? I purged sun-java6-jre and installed NoScript in case I was lucky, but how can I be sure? What areas of my system should I be concerned about? For what it's worth, I was running ghostery and betterprivacy when page in question was accessed. |
|||
Messages In This Thread |
Potentially Infected (java driveby) - by gurhush - 08-09-2012, 03:43 PM
RE: Potentially Infected (java driveby) - by gurhush - 08-09-2012, 04:00 PM
RE: Potentially Infected (java driveby) - by FreeBSD - 08-09-2012, 04:20 PM
RE: Potentially Infected (java driveby) - by gurhush - 08-09-2012, 04:22 PM
RE: Potentially Infected (java driveby) - by D9u - 09-09-2012, 04:23 AM
RE: Potentially Infected (java driveby) - by Robby - 09-09-2012, 08:46 AM
RE: Potentially Infected (java driveby) - by simon - 20-09-2012, 05:24 AM
RE: Potentially Infected (java driveby) - by jolia - 21-09-2012, 06:37 AM
RE: Potentially Infected (java driveby) - by Red - 13-12-2012, 11:23 AM
RE: Potentially Infected (java driveby) - by CrossFold - 14-12-2012, 01:46 AM
|