课程: Ethical Hacking: Hacking IoT Devices
今天就学习课程吧!
今天就开通帐号,24,700 门业界名师课程任您挑!
Solution: Enemybot
(upbeat electronic music) - [Instructor] Okay, now let's check our work. You were to read the article and then answer the questions. So first, what is Enemybot and how does it infect devices? Enemybot is a Mirai-based botnet malware that infects devices through vulnerabilities in modems, routers, and IoT devices. What makes mapping and taking down Enemybot's command and control server challenging? Well, Enemybot's command and control server convolutes, or obscures information and string values, and it hides behind Tor nodes to help conceal its location. What types of commands does Enemybot support? Well, Enemybot supports various commands, though they're mostly related to DDoS attacks, such as a DNS attack, which will flood DNS servers with hard-coded queries, or an HTTP attack, which will flood the target with HTTP requests. Which commands indicate possible extortion campaigns targeting specific companies? Well, a few of the identified commands were ARK. Now, this is to perform an…
随堂练习,边学边练
下载课堂讲义。学练结合,紧跟进度,轻松巩固知识。