June 2026
Beginner to intermediate
464 pages
11h 55m
English
In this chapter, we’ll create some supporting infrastructure and set up a controlled environment with Docker for developing, debugging, and testing our worm . . . I mean, mobile agent. You’ll learn about containers and more about network programming in the process. Then we’ll write a C version of a very simple worm able to infect a predefined set of machines. It will be too big to use on its own, so we’ll have to dust off our trusty dropper to get it onto the victim machines. In other words, we’ll develop a two-stage worm.
But first, let’s take a step back and consider the kind of system ...
Read now
Unlock full access