Botnets surrounding us: sending KADEMLIA2_BOOTSTRAP_REQ, KADEMLIA2_HELLO_REQ and their strict cousins
In the previous post the routing table has been analyzed; in this one the first type of messages exchanged to get into the Kad network will be discussed. I found out that there are some PDFs here and there describing the old Kad flow, so I will discuss here just the new one. I already […]