lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 21 Apr 2014 22:07:14 +0100 From: Kevin Breen <mymalwaresamples@...il.com> To: undisclosed-recipients:; Subject: [FD] RAT C2 Domains This is going out to a few lists, so apologies for those who get this a few times. As part of my project researching RATS - http://malwareconfig.com http://techanarchy.net/2014/04/rat-decoders/ I am finding myself with a large dataset of known Bad C2 Domains and IP's, Most of these are hosted on service like no-ip. So my question, other than an email to the abuse@.... email address are there any services that can make use of this data. As they are not web services on 80 im not sure if the normal range of web reputation databases can make use or not. Thoughts Kev -- Kevin Breen - Malware Analyst *Pinky*: "Gee, Brain, what do you want to do tonight?" *The Brain*: "The same thing we do every night, Pinky—try to take over the world!" *Find Me On Linkedin <http://uk.linkedin.com/in/kevbreen/> <http://uk.linkedin.com/in/kevbreen/>* *Fork Me On GitHub <https://github.com/kevthehermit>* *http://techanarchy.net <http://techanarchy.net/>* http://malwareconfig.com _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists