Could be spoofed but it's a little WIP. 1337 is the receiving port and anything on 911 ends the program and finishes writing the file.
I was thinking of developing Linux malware revolving around spoofed UDP requests for command execution. It would make the C2 practically impossible to find.
What do you guys think?
I was thinking of developing Linux malware revolving around spoofed UDP requests for command execution. It would make the C2 practically impossible to find.
What do you guys think?