Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
Technical Introduction to Bots  105
e author of PBot is identified as “V.S.”, with the source code initially avail-
able from silenz.be. At the time of discovery, silenz.be redirected to hxxp://cp10.
shieldhost.com/~planznet/down loads/botsrc/pBot.rar.
6.2.6.8 Tsunami
James Pleger provided a technical overview of this simple HTTP command and
control bot, requiring just a Web server and MySQL database for initial setup.
T
sunami enables an attacker to create a DDoS client that installs on a victim
computer, configured to connect to the centralized command and control server
d
esignated by the attacker (see Figure 6.8).
e bots shown
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068