|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
Re: [Full-disclosure] Howto Simulate a BotNet ?
Emulate every API call make your bot makes.
Run 30b instances.
Randomize.
A. Graph.
B. Optimize.
Repeat steps a and b.
-Travis
On Thu, May 7, 2009 at 10:28 AM, Jan G.B. <ro0ot.w00t@xxxxxxxxxxxxxx> wrote:
> 2009/5/7 Mark Sec <mark.sec@xxxxxxxxx>:
>> Well, Im looking info:
>>
>> 1) See all the traffic (Over botnet)
>> 2) Administering many slaves (Lab) with the master (lab) via IRC, web,
>> etc...
>> 3) Probe attacks DDoS and DoS (Lab)
>> 4) Probe remote and Local Exploits
>> 5) Infected via remote <iframe>, exploit, XSS etc.
>>
>> any1 ?
>>
>> -Mark :-)
>>
>>
>
>
> Sounds to me, like you're about to test your botnet client in a
> virtual environment.
>
>
>>
>>
>> 2009/5/6 Aadil Noorkhan <a.noorkhan@xxxxxxxxxxxxx>
>>>
>>> Hello,
>>>
>>> The closest I could find are:
>>> - link://[click] (rather interesting
>>> paper about an inside look at botnets)
>>> - link://[click]
>>> (video about a botnet simulation by BreakingPointSystems)
>>>
>>> Cheers,
>>> Aadil.
>>>
>>> On Thu, 2009-05-07 at 05:36 +0400, Valdis.Kletnieks@xxxxxx wrote:
>>> > On Wed, 06 May 2009 18:07:48 CDT, Mark Sec said:
>>> >
>>> > > Does any1 know a tool. squema, info or ideas to simulate a Botnet?
>>> > >
>>> > > Ideas:
>>> > >
>>> > > A) Many Vmware (workstations) over win32
>>> > > B) Make a fake traffic
>>> > > C) Make a scripts to simulate many hosts
>>> > > D) IDS/ IPS (to see the traffic)
>>> >
>>> > What behavior(s) of a botnet are you trying to simulate? There's a lot
>>> > of approaches, as you've already noticed - which one will work best will
>>> > depend a lot on what you're trying to do.
>>> --
>>> Aadil NOORKHAN
>>> Administrateur Unix
>>> ------------------------------------------------------
>>> LINKBYNET Indian Ocean
>>> BG Court, Route Saint-Jean, Quatre Bornes, Ile Maurice
>>> Tel direct : (+33) 01 48 13 21 78
>>> Tel : (+33) 1 48 13 00 00
>>> Fax : (+33) 1 48 13 31 21
>>> Email : a.noorkhan@xxxxxxxxxxxxx
>>> Web : www.linkbynet.com
>>> _______
>>> Astreinte : link://[click]
>>>
>>
>>
>>
>> Full-Disclosure - We believe in it.
>> Charter: link://[click]
>> Hosted and sponsored by Secunia - link://[click]
>>
>
>
> Full-Disclosure - We believe in it.
> Charter: link://[click]
> Hosted and sponsored by Secunia - link://[click]
>
Full-Disclosure - We believe in it.
Charter: link://[click]
Hosted and sponsored by Secunia - link://[click]
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|