Beefy Boxes and Bandwidth Generously Provided by pair Networks
No such thing as a small change

Re: sample malicious code

by Anonymous Monk
on Sep 27, 2012 at 13:29 UTC ( #996005=note: print w/replies, xml ) Need Help??

in reply to sample malicious code

I'm afraid I can't make out what you're asking.

The code doesn't seem very malicious to me -- it searches for TFTP servers on a (somewhat reduced) /16 netblock and tries to upload a file.

There's also a very poorly designed hash called %state that keeps a counter on how many times the host responded to two kinds of ping or TFTP. And that's the hash you are trying to do something to. I'm guessing you want to flatten it to an array, but I don't think that is easy to do until you're familiar with complex data structures.

May I recommend reading perldsc, and then Data::Dumper to visualise the hash? Or building your array inside the nested loop?

Also, you should tell the person who wrote that body of code that it is of poor quality. (Hey, (cr|h)ackers need critique, too.)

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://996005]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others contemplating the Monastery: (10)
As of 2016-10-25 19:57 GMT
Find Nodes?
    Voting Booth?
    How many different varieties (color, size, etc) of socks do you have in your sock drawer?

    Results (329 votes). Check out past polls.