HOME
NIRAFAME

DOWNLOAD PORTALS AND LATEST S APP

LATEST NEWSALL MOST WANTED JAVA APPLICATION FREE DOWNLOAD
HOW TO BUILD A SITE ASK QUESTION FROM THIS PORTALALL HACKING APPLICATION FOR ANDROID
NIS
NIRAFAME
Home

      

NIS
LATEST ARTICLES BY NIRAFAME

LEARN BOTNET HACK

A botnet or robot network
is a group of computers
running a computer
application controlled and
manipulated only by the
owner or the software
source. The botnet may
refer to a legitimate
network of several
computers that share
program processing
amongst them.
Usually though, when
people talk about botnets,
they are talking about a
group of computers
infected with the malicious
kind of robot software,
the bots, which present a
security threat to the
computer owner. Once
the robot software (also
known as malicious
software or malware) has
been successfully installed
in a computer, this
computer becomes a
zombie or a drone, unable
to resist the commands of
the bot commander.
A botnet may be small or
large depending on the
complexity and
sophistication of the bots
used. A large botnet may
be composed of ten
thousand individual
zombies. A small botnet,
on the other hand may be
composed of only a
thousand drones. Usually,
the owners of the zombie
computers do not know
that their computers and
their computers’
resources are being
remotely controlled and
exploited by an individual
or a group of malware
runners through Internet
Relay Chat (IRC)
There are various types of
malicious bots that have
already infected and are
continuing to infect the
internet. Some bots have
their own spreaders – the
script that lets them infect
other computers (this is
the reason why some
people dub botnets as
computer viruses) – while
some smaller types of
bots do not have such
capabilities.
Different Types of Bots
Here is a list of the most
used bots in the internet
today, their features and
command set.
XtremBot, Agobot,
Forbot, Phatbot
These are currently the
best known bots with
more than 500 versions
in the internet today. The
bot is written using C++
with cross platform
capabilities as a compiler
and GPL as the source
code. These bots can
range from the fairly
simple to highly abstract
module-based designs.
Because of its modular
approach, adding
commands or scanners
to increase its efficiency in
taking advantage of
vulnerabilities is fairly
easy. It can use libpcap
packet sniffing library,
NTFS ADS and PCRE.
Agobot is quite distinct in
that it is the only bot that
makes use of other
control protocols besides
IRC.
UrXBot, SDBot, UrBot
and RBot
Like the previous type of
bot, these bots are
published under GPL, but
unlike the above
mentioned bots these
bots are less abstract in
design and written in
rudimentary C compiler
language. Although its
implementation is less
varied and its design less
sohisticated, these type of
bots are well known and
widely used in the
internet.
GT-Bots and mIRC
based bots
These bots have many
versions in the internet
mainly because mIRC is
one of the most used IRC
client for windows. GT
stands for global threat
and is the common name
for bots scripted using
mIRC. GT-bots make use
of the mIRC chat client to
launch a set of binaries
(mainly DLLs) and scripts;
their scripts often have the
file extensions .mrc.
Malicious Uses of Botnets
Types Of Botnet
Attacks
Denial of Service
Attacks
A botnet can be used as a
distributed denial of
service weapon. A botnet
attacks a network or a
computer system for the
purpose of disrupting
service through the loss
of connectivity or
consumption of the victim
network’s bandwidth and
overloading of the
resources of the victim’s
computer system. Botnet
attacks are also used to
damage or take down a
competitor’s website.
Fast flux is a DNS
technique used by botnets
to hide phishing and
malware delivery sites
behind an ever-changing
network of compromised
hosts acting as proxies.
Any Internet service can
be a target by botnets.
This can be done through
flooding the website with
recursive HTTP or
bulletin-board search
queries. This mode of
attack in which higher
level protocols are utilised
to increase the effects of
an attack is also termed as
spidering.
Spyware
It’s a software which
sends information to its
creators about a user’s
activities – typically
passwords, credit card
numbers and other
information that can be
sold on the black market.
Compromised machines
that are located within a
corporate network can be
worth more to the bot
herder, as they can often
gain access to confidential
information held within
that company. There have
been several targeted
attacks on large
corporations with the aim
of stealing sensitive
information, one such
example is the Aurora
botnet.
Adware
Its exists to advertise
some commercial entity
actively and without the
user’s permission or
awareness, for example
by replacing banner ads
on web pages with those
of another content
provider.
Spamming and Traffic
Monitoring
A botnet can also be used
to take advantage of an
infected computer’s TCP/
IP’s SOCKS proxy
protocol for networking
applications. After
compromising a
computer, the botnet
commander can use the
infected unit (a zombie) in
conjunction with other
zombies in his botnet
(robot network) to harvest
email addresses or to
send massive amounts of
spam or phishing emails.
Moreover, a bot can also
function as a packet sniffer
to find and intercept
sensitive data passing
through an infected
machine. Typical data that
these bots look out for are
usernames and
passwords which the
botnet commander can
use for his personal gain.
Data about a competitor
botnet installed in the
same unit is also mined
so the botnet commander
can hijack this other
botnet.
Access number
replacements are where
the botnet operator
replaces the access
numbers of a group of
dial-up bots to that of a
victim’s phone number.
Given enough bots
partake in this attack, the
victim is consistently
bombarded with phone
calls attempting to
connect to the internet.
Having very little to
defend against this attack,
most are forced into
changing their phone
numbers (land line, cell
phone, etc.).
Keylogging and Mass
Identity Theft
An encryption software
within the victims’ units
can deter most bots from
harvesting any real
information.
Unfortunately, some bots
have adapted to this by
installing a keylogger
program in the infected
machines. With a
keylogger program, the
bot owner can use a
filtering program to gather
only the key sequence
typed before or after
interesting keywords like
PayPal or Yahoo mail.
This is one of the reasons
behind the massive
PayPal accounts theft for
the past several years.
Bots can also be used as
agents for mass identity
theft. It does this through
phishing or pretending to
be a legitimate company
in order to convince the
user to submit personal
information and
passwords. A link in these
phishing emails can also
lead to fake PayPal, eBay
or other websites to trick
the user into typing in the
username and password.
Botnet Spread
Botnets can also be used
to spread other botnets in
the network. It does this
by convincing the user to
download after which the
program is executed
through FTP, HTTP or
email.
Pay-Per-Click Systems
Abuse
Botnets can be used for
financial gain by
automating clicks on a
pay-per-click system.
Compromised units can
be used to click
automatically on a site
upon activation of a
browser. For this reason,
botnets are also used to
earn money from
Google’s Adsense and
other affiliate programs by
using zombies to
artificially increase the click
counter of an
advertisement.

Back to posts
This post has no comments - be the first one!

UNDER MAINTENANCE
Source: Google news
hack
LATEST Download BY NIRAFAME
download jamb access to hack you jamb questions
HOME OF TECHNOLOGY ¤¤¤¤¤¤
GET0 ALL WAEC RUNZ FREE CLICK HERE NOW ALL FREE NO CODE REQUIRED NO MONEY REQUIRED
TECHNOLOGY/SCIENCE
* TECHNOLOGY DISCUSION (13/13)
Let talk technology
* XTGEM CODING/HELP (5/5)
We help you ans any question that all about xtgem codin and tweaks
* PHONES|REVIEWS (19/19)
Do you have any problem with your phone we help
* SCIENCE|TECHNOLOGY PICTURE (3/4)
Do imagine somethin you might see it here
* MODEM (1/1)
Solve or hack modem
* PHYSICS (11/12)
Some wonder of physics in science
* SITE DIRECTORY (1/1)
Place your site advert free on nirafame let the whole world see and patronise you
NIRAFAME ENTERTAINMENT
* Love (12/12)
Get love text message and love talks
* Sex/tips (11/11)
This is all about sextips and some scientific fact of sex and body
* dairy (1/1)
Let your status show on google post it here
* jokes (20/21)
Laugh out your soul

Online: Guests: 1
Home

      

Copyright2
http://nirafame.jw.lt/images/1-1200x423_thumb.jpg

NIRAFAME - Copyright © 2015 - 2017 AKPATA ISAAC ADEIZA. All rights reserved. See How To Advertise. 10
Disclaimer: Every NIRAFAME member is solely responsible for anything that he/she posts or uploads on NIRAFAME. hits counter
hits counter

XtGem Forum catalog
I