I found it helpful to use the SoTM's from the Honeynet project that focused on Malicious code RCE. Try 32 & 33. Best thing is you get to see how other people went about doing it to.
http://www.honeynet.org/scans/scan32/ http://www.honeynet.org/scans/scan33/ Goodluck, Ty On 8/4/05, M4ch3T3 Hax <[EMAIL PROTECTED]> wrote: > Hello all, > > I have recently graduated from a computers & networking course at > university and have spent alot of my time analysing network security > from a scanning/sniffing/hardening point of view. > > I'm now becoming very interested in learning more about malicious code > analysis in a virtual machine environment. I have read documentation > and set up the environment and tools etc.. However I have no malicious > code to look at! does anyone know of a way to get hold of some? > > Also, if anyone can recommend any further reading or sites etc. It > would be very much appreciated! > > Cheers! > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
