On-going Internet Emergency and Domain Names (kill this thread)
Roland Dobbins
rdobbins at cisco.com
Sun Apr 1 05:49:23 UTC 2007
On Mar 31, 2007, at 11:16 PM, william(at)elan.net wrote:
> But DNS here is just a tool, bad guys could
> easily build quite complex system of control by using active HTTP
> such as XML-RPC, they are just not that sophisticated (yet) or
> maybe they don't need anything but simple list of pointers.
Actually, the discussion isn't about the use of the DNS protocol
itself as a botnet C&C channel (as you indicate, that's certainly
doable), but rather about domains used as pointers to malware which
is then distributed via various methods, same for phishing, as well
as the use of DNS to provide server agility for botnet controllers
irrespective of the actual protocol used for C&C.
-----------------------------------------------------------------------
Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice
Words that come from a machine have no soul.
-- Duong Van Ngo
More information about the NANOG
mailing list