Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
110 Malicious Bots
institutions targeted by the code. Attackers likely used victimized bank accounts
in Spain to sniff traffic and analyze scripts and Web content. After performing a
targeted analysis, they then created an HTML injection routine to insert an addi-
tional password field following the predictable name and password field presented
by the targeted bank upon normal log-on.
An
efficient and highly scalable Web-based C&C server is used by an attacker
to manage a MetaFisher botnet. is is perhaps one of the more important
e
lements of MetaFisher, because a single C&C Web-based server can passively
support hundreds of thousands of bots easily. is is highly scalable compared to
f
ormer IRC-based C&C strategies. MetaFisher runs off of a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068