Beefy Boxes and Bandwidth Generously Provided by pair Networks
"be consistent"
 
PerlMonks  

Re: sample malicious code

by Anonymous Monk
on Sep 27, 2012 at 13:29 UTC ( #996005=note: print w/ replies, xml ) Need Help??


in reply to sample malicious code

I'm afraid I can't make out what you're asking.

The code doesn't seem very malicious to me -- it searches for TFTP servers on a (somewhat reduced) /16 netblock and tries to upload a file.

There's also a very poorly designed hash called %state that keeps a counter on how many times the host responded to two kinds of ping or TFTP. And that's the hash you are trying to do something to. I'm guessing you want to flatten it to an array, but I don't think that is easy to do until you're familiar with complex data structures.

May I recommend reading perldsc, and then Data::Dumper to visualise the hash? Or building your array inside the nested loop?

Also, you should tell the person who wrote that body of code that it is of poor quality. (Hey, (cr|h)ackers need critique, too.)


Comment on Re: sample malicious code
Download Code

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://996005]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others wandering the Monastery: (7)
As of 2014-08-23 19:01 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    The best computer themed movie is:











    Results (178 votes), past polls