To report a botnet PRIVATELY please email: [EMAIL PROTECTED] ---------- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Gadi Evron wrote: > To report a botnet PRIVATELY please email: [EMAIL PROTECTED] > ---------- > Ami (and me) just wrote about it: > http://blogs.securiteam.com/index.php/archives/355 > > But if you have the time, I'd STRONGLY suggest you go straight to the > amazing work at the source: > http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-$ - ------------------ One could technically kill the authentication (client ssl handshake) part of skype which occurs over TCP. What's messy is the UDP aspect which performs UDP port hopping or should I say super node effect. What I've heard is, the skype development team spent 80% of their time making sure skype could bypass NAT/FW and they did a hell of job addressing it. I wasn't able to block (skype) UDP traffic (TCP part is easy) using their iptables ruleset example. regards, /virendra regards, > > Gadi. > > _______________________________________________ > To report a botnet PRIVATELY please email: [EMAIL PROTECTED] > All list and server information are public and available to law enforcement > upon request. > http://www.whitestar.linuxbox.org/mailman/listinfo/botnets > > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFEGaAcpbZvCIJx1bcRAiytAJ9+M6isbPBbXDgfq5SoGe4mAz0YyQCfcLTA 5gFA6A2ZNZxVcJ1THWpmg5s= =EC9W -----END PGP SIGNATURE----- _______________________________________________ To report a botnet PRIVATELY please email: [EMAIL PROTECTED] All list and server information are public and available to law enforcement upon request. http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
