Description: Internet Worms' most important feature is the ability to scan for more vulnerable machines. The first part of the scan is to generate a victim IP address - this can be done through a variety of scanning techniques. A good listing is available in the "scanning section" of this paper. This 2 part video series will discuss the programming of a Sequential, Subnet and Random IP address generator. In this video tutorial we will focus on the Random Scanning pattern - which is simply to generate a random IP address and try to infect it. As the Internet has large chunks of unallocated IP addresses this technique definitely has a lot of drawbacks, but most worms use it. Links:
1. Internet and Computer Worms
2. Analysis of the Blaster worm
3. Morris Internet Worm (First Internet Worm)
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Hi! Where can I find the source code? There's no link to it.
its here :) http://www.security-freak.net/worms/Scanner.c
and for other Source Codes visit here :) http://www.security-freak.net/videos.html
link is dead. Anyone have another?