That is a rather broad request considering how many flavors of botnets, various software, and purposes of of them. I would have to ask what possible purpose could want them for considering such broadness?
However I would watch this https://twitter.com/#!/pastebin/status/172625863970529280 & http://pastebin.com/eJqhCjca On Thu, Feb 23, 2012 at 3:20 PM, James Smith <[email protected]> wrote: > Hello, > > Can anyone on this list provide botnet network traffic for analysis, or Ip’s > which have been infected. > -- > Sincerely; > > > James Smith > CEO, CEH, Security Analyst > Email: [email protected] > Phone: 1877-760-1953 > Website: www.SmithwaySecurity.com > > > CONFIDENTIALITY NOTICE: This communication with its contents may contain > confidential and/or legally privileged information. It is solely for the use > of the intended recipient(s). Unauthorized interception, review, use or > disclosure is prohibited and may violate applicable laws including the > Electronic Communications Privacy Act. If you are not the intended > recipient, please contact the sender and destroy all copies of the > communication. > > - This communication is confidential to the parties it was intended to serve > - > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
