Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
38 Malicious Bots
Web-based C&C solution, everything is fairly automated at this point. is
includes a streamlined solution for an FTP drop server to collect stolen log files,
the ability to roll out updates and configurations and commands to bots, and
the capability of tracking bot infections by country. Figures 3.4 and 3.5 contain
images of how a MetaFisher C&C page is used to manage and update bots with
an easy-to-use Web interface.
I
n late 2007, Nethell was a common bot, capturing extensive details from infected
computers and showing how bot authors organize stolen log data. Figure 3.6 pro-
vides an example from a log file where the victi ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068