![]() ![]() I immediately recognized the tweets in the above screenshot as being base64 encoded. ![]() Many times when major outlets report on botnet/worms/virii/etc, crucial details are left out either intentionally (to protect the innocent) or accidentally. What caught my eye wasn’t so much the article itself but the screenshot accompanying the article. ![]() I was reading some feeds on Friday (Aug 14th) and came across Wired’s article on outsourcing botnet C&C (command & control) to Twitter. There’s a quick discussion on some malware I found hosted at (Jose probably saw it too but didn’t mention it) as well as a possible lead to a very sloppy botnet master.I mirror all the necessary info so the readers can do this themselves.I attempt to offer a more detailed description of my methods/logic as a pseudo-tutorial.Jose and I differed on some of the tools & techniques used.If you’ve read Jose’s post, this post may still be worth the read for several reasons: So while I present some of the same information as Jose, this duplication of information only came to my attention afterwords. I wasn’t aware of Jose Nazario’s post concerning this topic while I was conducting this research I had only been exposed to the Wired Threat Level article prior to researching. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |