|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
Re: [Full-disclosure] Howto Simulate a BotNet ?
No no no, this is a list of knowledge.
If Mark wants to simulate a botnet, firstly he needs to learn how to
do it for a generic purpose network.
Mark, try "ns-2", the best of its kind, and learn how to simulate and
tune bot entities, according to your needs.
Regards,
On Thu, May 7, 2009 at 1:54 AM, Aadil Noorkhan <a.noorkhan@xxxxxxxxxxxxx> wrote:
> Hello,
>
> The closest I could find are:
> - link://[click] (rather interesting
> paper about an inside look at botnets)
> - link://[click]
> (video about a botnet simulation by BreakingPointSystems)
>
> Cheers,
> Aadil.
>
> On Thu, 2009-05-07 at 05:36 +0400, Valdis.Kletnieks@xxxxxx wrote:
>> On Wed, 06 May 2009 18:07:48 CDT, Mark Sec said:
>>
>> > Does any1 know a tool. squema, info or ideas to simulate a Botnet?
>> >
>> > Ideas:
>> >
>> > A) Many Vmware (workstations) over win32
>> > B) Make a fake traffic
>> > C) Make a scripts to simulate many hosts
>> > D) IDS/ IPS (to see the traffic)
>>
>> What behavior(s) of a botnet are you trying to simulate? There's a lot
>> of approaches, as you've already noticed - which one will work best will
>> depend a lot on what you're trying to do.
> --
> Aadil NOORKHAN
> Administrateur Unix
> ------------------------------------------------------
> LINKBYNET Indian Ocean
> BG Court, Route Saint-Jean, Quatre Bornes, Ile Maurice
> Tel direct : (+33) 01 48 13 21 78
> Tel : (+33) 1 48 13 00 00
> Fax : (+33) 1 48 13 31 21
> Email : a.noorkhan@xxxxxxxxxxxxx
> Web : www.linkbynet.com
> _______
> Astreinte : link://[click]
>
>
> Full-Disclosure - We believe in it.
> Charter: link://[click]
> Hosted and sponsored by Secunia - link://[click]
>
--
Marcio Barbado, Jr.
Full-Disclosure - We believe in it.
Charter: link://[click]
Hosted and sponsored by Secunia - link://[click]
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|