Beefy Boxes and Bandwidth Generously Provided by pair Networks
No such thing as a small change

Re: sample malicious code

by Anonymous Monk
on Sep 27, 2012 at 13:29 UTC ( #996005=note: print w/replies, xml ) Need Help??

in reply to sample malicious code

I'm afraid I can't make out what you're asking.

The code doesn't seem very malicious to me -- it searches for TFTP servers on a (somewhat reduced) /16 netblock and tries to upload a file.

There's also a very poorly designed hash called %state that keeps a counter on how many times the host responded to two kinds of ping or TFTP. And that's the hash you are trying to do something to. I'm guessing you want to flatten it to an array, but I don't think that is easy to do until you're familiar with complex data structures.

May I recommend reading perldsc, and then Data::Dumper to visualise the hash? Or building your array inside the nested loop?

Also, you should tell the person who wrote that body of code that it is of poor quality. (Hey, (cr|h)ackers need critique, too.)

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://996005]
[marto]: finding bugs, either in the CPU layer or hypervisor, finding undocumented instructions
[zentara]: are you talikng about perf?
[Discipulus]: i miss what an undocumented instructions can be, and how can be used
[zentara]: perf
[marto]: X86_instruction_li stings

How do I use this? | Other CB clients
Other Users?
Others wandering the Monastery: (10)
As of 2017-07-28 12:02 GMT
Find Nodes?
    Voting Booth?
    I came, I saw, I ...

    Results (428 votes). Check out past polls.