|
@@ -108,8 +108,12 @@ class MembersMgmtCommAttack(BaseAttack.BaseAttack):
|
|
|
# presence of NAT at the gateway of the network
|
|
|
Param.NAT_PRESENT: ParameterTypes.TYPE_BOOLEAN,
|
|
|
|
|
|
- # the base PCAP for the TTL distribution
|
|
|
+ # whether the TTL distribution should be based on the input PCAP
|
|
|
+ # or the CAIDA dataset
|
|
|
Param.TTL_FROM_CAIDA: ParameterTypes.TYPE_BOOLEAN,
|
|
|
+
|
|
|
+ # whether the destination port of a response should be the ephemeral port
|
|
|
+ # its request came from or a static (server)port based on a hostname
|
|
|
Param.BOTNET_DST_PORT_CALCULATION: ParameterTypes.TYPE_BOOLEAN,
|
|
|
|
|
|
# information about the interval selection strategy
|
|
@@ -396,8 +400,6 @@ class MembersMgmtCommAttack(BaseAttack.BaseAttack):
|
|
|
|
|
|
:param bot_configs: the existing bot configurations
|
|
|
"""
|
|
|
- # Mapping IP to ASN: http://www.team-cymru.org/IP-ASN-mapping.html
|
|
|
- # Why not assign TTLs for unknown IPs like this?
|
|
|
|
|
|
def get_ip_ttl_distrib():
|
|
|
"""
|