Skip to Main Content
Malicious Bots
book

Malicious Bots

by Ken Dunham, Jim Melnick
August 2008
Intermediate to advanced content levelIntermediate to advanced
168 pages
4h 55m
English
Auerbach Publications
Content preview from Malicious Bots
120 Malicious Bots
while True:
try:
res = dig(name, server)
if res and res not in iplist:
iplist.append(res)
server = res
else:
server = sys.argv[1]
except KeyboardInterrupt: break
print iplist
if __name__ == ‘__main__’:
main()
To use the script, type the following command: ./stormwalk.py domain IP. With
minor modifications it is easy for a researcher to quickly return lookup results for
hundreds of servers.
C
onstant UDP traffic seen from Storm worm–infected computers is designed
to discover and connect Storm worm–infected computers by the Storm worm itself.
e blacklist section of the peers.i ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 9781420069068