Review Article
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
Listing 15
List of functions used in handle_event() to infect vulnerable devices.
root/loader/src/headers/connection.h | (49) int connection_consume_iacs(struct | connection conn); | (50) int connection_consume_login_prompt(struct | connection conn); | (51) int connection_consume_password_prompt( | struct connection conn); | (52) int connection_consume_prompt(struct | connection conn); | (53) int connection_consume_verify_login(struct | connection conn); | (54) int connection_consume_psoutput(struct | connection conn); | (55) int connection_consume_mounts(struct | connection conn); | (56) int connection_consume_written_dirs(struct | connection conn); | (57) int connection_consume_copy_op(struct | connection conn); | (58) int connection_consume_arch(struct | connection conn); | (59) int connection_consume_arm_subtype(struct | connection conn); | (60) int connection_consume_upload_methods( | struct connection conn); | (61) int connection_upload_echo(struct | connection conn); | (62) int connection_upload_wget(struct | connection conn); | (63) int connection_upload_tftp(struct | connection conn); | (64) int connection_verify_payload(struct | connection conn); | (65) int connection_consume_cleanup(struct | connection conn); |
|