DarkyAngel Posted July 2, 2012 Report Posted July 2, 2012 Cuprins :1. The Backstory (DigiP)2. Preface3. Analyzing the Payloads (bwall)3.1 Decoding (bwall)3.1.1 Common Encodings (bwall)3.2 Reverse Engineering (bwall)3.3 Information Gathering (DigiP)3.3.1 Identify the true IP or domain name of the attacker in the log (DigiP)3.3.2 Identify the RFI script, and see if you can download it. (DigiP)3.4 Advanced Information Gathering (bwall)3.4.1 Impersonation Method (bwall)3.4.2 Castration Method (bwall)3.4.3 Castration Example (bwall)4. Attacking the Attackers4.1 Knocking the Bots Down (bwall)4.2 Keeping them Down (bwall)4.3 Things to look for post infection (DigiP)5. Conclusion (bwall)5.1 Special Thanks5.1.1 DigiP5.1.2 bwall5.1.3 Thank you to MaXeDownload :http://www.exploit-db.com/wp-content/themes/exploit/docs/19395.pdf Quote