Questions tagged [botnet]

A botnet is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.

A botnet's tasks can be as mundane as keeping control of an IRC channel, or it could be used to send spam email or participate in DDoS attacks. The word botnet stems from the two words robot and network.

http://en.wikipedia.org/wiki/Botnet

36 questions
1
vote
1 answer

Could Amazon S3 (& AWS generally) Services Be Affected by DDOS Botnet Attacks Against Amazon.com

With groups planning to attack Amazon, does anyone have an idea if customers who use their Cloud Services could be affected? I get that they are trying to shut down the retail side, but do you think this would affect web apps that use AWS? Last, is…
zkidd
  • 513
  • 1
  • 5
  • 18
1
vote
4 answers

Good source to learn how about virus and other security tools?

Anti-virus, malware, botnets and the like are becoming larger and larger parts of our daily lives. Are there any resources that discuss creating anti-virus tools, security tools and such? Seems like an interesting topic, but I have not been able to…
RiddlerDev
  • 7,370
  • 5
  • 46
  • 62
0
votes
1 answer

Snort rule doesn't generate alerts when hosts responding simultaneously

alert tcp any any -> any any (msg:"PRIVMSG from an IRC channel suspecious act"; content:"PRIVMSG"; offset:0; depth:7; nocase; dsize:<64; flow:to_server,established; tag:session,300,seconds; classtype:bad-unknown; sid:2000346; rev:4;) The above rule…
Aymen
  • 83
  • 1
  • 2
  • 12
0
votes
0 answers

Error decrypting password: (87, 'CryptUnprotectData', 'The parameter is incorrect.')

hi i am getting an error with CryptUnprotectData and when i run the command line I get Error decrypting password: (87, 'CryptUnprotectData', 'The parameter is incorrect.') please help me update the source code and get it working correctly I don't…
0
votes
1 answer

C Segmentation fault, pthread_create

I am stumped with this pthread_create segmentation fault. I have already used GDB to find where the fault is — any ideas? And yes it's a botnet command and control server; please no negative comments because of what it is. My intentions are good and…
Zero
  • 3
  • 3
0
votes
1 answer

docker container part of botnet via get requests (ddos)

Hi I get an message from my provider that my server is a part of a ddos-botnet. So i investigate my docker containers and found some corrupted containers (jitsi-meet-web (https://github.com/jitsi/docker-jitsi-meet), nextcloud…
Ted Mosby
  • 79
  • 9
0
votes
1 answer

how do i get headers on a website with python

to give you some context i am building a botnet and i need to get the authorization header from here is the link https://discordapp.com/api/v6/users/@me I have already tried this user = requests.get( "https://discordapp.com/api/v6/users/@me",…
Hackamous
  • 3
  • 1
0
votes
0 answers

How to make a Standalone exploit with a custom payload?

First of all, what I want to achieve: I want to exploit a device with a script (in python) without metasploit (therefore standalone) and run a custom programm on the exploitet device. This should happen automatically (I just want to run the script…
0
votes
2 answers

How to decode a .wasm code? Is it possible?

Just curious to know what the code is doing in a computer, I would like to decode a .wasm code - available at https://lifeinspace.org/main.wasm. Basically, from what I found in internet, .wasm is a web assembly code, which could have…
sundar
  • 396
  • 1
  • 6
  • 19
0
votes
1 answer

Domain generation algorithm - Locky

Looking at a DGA called Locky written in python. This is some part of it. # Shift the dates modYear = uint32(__ROR4__(modConst1 * (SystemTime.wYear + 0x1BF5), 7)) modYear = uint32(__ROR4__(modConst1 * (modYear + seed + modConst2), 7)) …
Emre
  • 1
  • 2
0
votes
2 answers

Statistics on where Malicious Hackers / Spammers live

Does anyone have any ideas on where the worst Global Hackers Live (from a USA perspective). By this I mean, where do warez, serialz, botnets, spammers have their residence? In what countries are those hackers most likely to live? How do they connect…
unixman83
  • 9,421
  • 10
  • 68
  • 102
0
votes
0 answers

Only allow whitelisted MAC's access to network

I got an email from my ISP that i have been victim of the mirai botnet as it decided to take over my security cameras. I thought i was safe from this since none of my devices use default passwords but it appears there was also a telnet vulnerability…
user3569450
  • 75
  • 10
0
votes
1 answer

compare .csv data using orange

I have converted packet capture (.pcap) file of network traffic that has botnet behaviour into .csv file. From the .csv, I had gain information about the botnet throughput. My main question here is, how can I use orange as a machine learning…
nasz
  • 1
  • 2
0
votes
0 answers

Building error in visual studio 2010

I am working on detection of botnets and want to create IDS by analysing the traffic patterns of botnets. For running the botnet: I got Zeus source code. When I am building Zeus botnet 2.0.8.9 source code in Visual Basic 2010 (I am a newbie to…
Rahul
  • 3
  • 3
0
votes
1 answer

Botnet filter alert on .js include link

I'm currently using Typekit, and had a problem with the include link no longer working. When I follow the include link it renders an html page saying that it has been…
cchapman
  • 3,269
  • 10
  • 50
  • 68