To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Gadi Evron wrote:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> ----------
> Ami (and me) just wrote about it:
> http://blogs.securiteam.com/index.php/archives/355
> 
> But if you have the time, I'd STRONGLY suggest you go straight to the
> amazing work at the source:
> http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-$
- ------------------
One could technically kill the authentication (client ssl handshake)
part of skype which occurs over TCP. What's messy is the UDP aspect
which performs UDP port hopping or should I say super node effect.

What I've heard is, the skype development team spent 80% of their time
making sure skype could bypass NAT/FW and they did a hell of job
addressing it.

I wasn't able to block (skype) UDP traffic (TCP part is easy) using
their iptables ruleset example.



regards,
/virendra



regards,
> 
>         Gadi.
> 
> _______________________________________________
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> All list and server information are public and available to law enforcement 
> upon request.
> http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
> 
> 
> 


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFEGaAcpbZvCIJx1bcRAiytAJ9+M6isbPBbXDgfq5SoGe4mAz0YyQCfcLTA
5gFA6A2ZNZxVcJ1THWpmg5s=
=EC9W
-----END PGP SIGNATURE-----
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to