EvilZone
Hacking and Security => Tutorials => : geXXos December 06, 2012, 04:55:15 PM
-
An exceptional reading from SANS
http://upload.evilzone.org/download.php?id=6337752&type=rar
Abstract
Email is consistently used to propagate malware, conduct phishing and deliver spam.
A large proportion of this unwanted email is sent by compromised machines or computer
zombies. This paper observes that computer zombies react differently to being greylisted,
providing a method to profile computer zombies into various types. The GCIH course touches
on the concept that this age is the “age of the botnets” and how malware is propagated with
the help of email. This paper extends this topic by analysing greylisting activity for the
purposes of identifying computer zombies and exploring methods to reduce the unwanted
email received from botnets.
-
Thanks. Does this directly or indirectly hint on how to prevent or catch if you PC is part of a botnet?