Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
46 Malicious Bots
of a Windows rootkit for stealth, a keylogger component for stealing credentials, a
browser helper object (BHO) for reporting data back to an attacker, and more.*
Bots are installed through multiple vectors, including user interaction and social
engineering, silent execution of code through a Web-based exploit, and brute force
attacks against weakly protected accounts or network shares. One good example
o
f this came in November 2006, when SANS researcher Joel Esler identified a
“massive new outbreak of bots” exploiting Symantec’s Client Security and AntiVirus
Corporate edition products.†
4.4 “Botmasters” Who Were C ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068