June 2026
Beginner to intermediate
464 pages
11h 55m
English
In this chapter, we’ll add network scanning capabilities to our worm so it will be able to identify potential hosts to infect without us having to give it a hardcoded list of IP addresses. We’ll spend most of our time building C and x86_64 implementations of a scanner, then see how the code translates to our other platforms. With the addition of this element, we’ll have the complete source code for a fully functioning, self-contained worm.
Network scanning is a broad topic, covering everything from basic port scanning (figuring out which ports are open) to more sophisticated reconnaissance ...
Read now
Unlock full access