Hacker News new | past | comments | ask | show | jobs | submit login

I suppose a better question might be, then, does anyone have any resources for gaining a better understanding of how this exploit works?



Most of the value is in the data (common login credentials). The bulk of obfuscated code is probably stuff doing the network communication and perhaps some other mundane stuff, that you can do manually (over telnet, or whatever) if you like and don't care about creating a botnet.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: