Examine the Skype protocol: under the hood

How does Skype communicate, how does the protocol work? A very nice paper about the communication of Skype, use cases for abusing the network as a botnet, worms, techniques. Everything you need to code your own client (or bot), details about the protocol, a working Python library, …

Paper by the Sans Institute.

http://www.sans.org/reading-room/whitepapers/covert/skype-data-exfiltration-34560 (PDF)

Leave a Reply

Your email address will not be published. Required fields are marked *