lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+WKUVv+zfycN6dcfvtdE2bny+GgEAZg8sq0HGWoWhniS3VfjA@mail.gmail.com>
Date: Mon, 21 Apr 2014 22:07:14 +0100
From: Kevin Breen <mymalwaresamples@...il.com>
To: undisclosed-recipients:;
Subject: [FD] RAT C2 Domains

This is going out to a few lists, so apologies for those who get this a few
times.

As part of my project researching RATS - http://malwareconfig.com
http://techanarchy.net/2014/04/rat-decoders/

I am finding myself with a large dataset of known Bad C2 Domains and IP's,
Most of these are hosted on service like no-ip.

So my question, other than an email to the abuse@.... email address are
there any services that can make use of this data. As they are not web
services on 80 im not sure if the normal range of web reputation databases
can make use or not.


Thoughts

Kev

-- 
Kevin Breen - Malware Analyst

*Pinky*: "Gee, Brain, what do you want to do tonight?"
*The Brain*: "The same thing we do every night, Pinky—try to take over the
world!"


*Find Me On Linkedin <http://uk.linkedin.com/in/kevbreen/>
<http://uk.linkedin.com/in/kevbreen/>*
*Fork Me On GitHub <https://github.com/kevthehermit>*
*http://techanarchy.net <http://techanarchy.net/>*
http://malwareconfig.com

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ