Botnets : The Collective Power
Quote from themadhacker on April 14, 2021, 4:23 amA few weeks ago, I read up on botnets and I read into the havoc that can be wrought.
The logic is simple: Leverage a pattern of factory defaults / known weaknesses within IOT things and gain control over as many individual devices as possible.
There have been a few famous botnets:
Mirai Botnet
Devices infected by Mirai continuously scan the internet for the IP address of Internet of things (IoT) devices. Mirai includes a table of IP Address ranges that it will not infect, including private networks and addresses allocated to the United States Postal Service and Department of Defense.3eve
3ve utilized the malware packages Boaxxe and Kovter to infect a network of PCs. They were spread through emails and fake downloads, and once infected, the bots would generate fake clicks on online advertisements. The clicks would be used on fake websites, which hosted ads and then absorbed the ad revenue from the false impressions.
Those are a few of the most recent botnets, and there have been some derivatives as well. Frankly, I know less than I should when it comes to the development of a dropper, payload, or any of the usual tools botnets usually use to gain control or gain leverage over the target.
A useful tool that I have been playing around with (but with little to no success) is build your own botnet.
BYOB is a super neat collection of tools and a console and web gui via docker. It has a compiler for different target machines, and has various tools to gain control over a remote machine, mine crypto, take screenshots, log keys, and a few others.
How many bots does it take to have a botnet?
How much development / man hours will it take, even with an open source system like BYOB?After the development of a dropper, a python script is run to load all of the bot's modules remotely. These modules allow for screenshots, remote control, etc, and they do not require python to be installed on the target machines.
I'll track progress on the project here.
-TheMadHacker
A few weeks ago, I read up on botnets and I read into the havoc that can be wrought.
The logic is simple: Leverage a pattern of factory defaults / known weaknesses within IOT things and gain control over as many individual devices as possible.
There have been a few famous botnets:
Mirai Botnet
Devices infected by Mirai continuously scan the internet for the IP address of Internet of things (IoT) devices. Mirai includes a table of IP Address ranges that it will not infect, including private networks and addresses allocated to the United States Postal Service and Department of Defense.
3eve
3ve utilized the malware packages Boaxxe and Kovter to infect a network of PCs. They were spread through emails and fake downloads, and once infected, the bots would generate fake clicks on online advertisements. The clicks would be used on fake websites, which hosted ads and then absorbed the ad revenue from the false impressions.
Those are a few of the most recent botnets, and there have been some derivatives as well. Frankly, I know less than I should when it comes to the development of a dropper, payload, or any of the usual tools botnets usually use to gain control or gain leverage over the target.
A useful tool that I have been playing around with (but with little to no success) is build your own botnet.
BYOB is a super neat collection of tools and a console and web gui via docker. It has a compiler for different target machines, and has various tools to gain control over a remote machine, mine crypto, take screenshots, log keys, and a few others.
How many bots does it take to have a botnet?
How much development / man hours will it take, even with an open source system like BYOB?
After the development of a dropper, a python script is run to load all of the bot's modules remotely. These modules allow for screenshots, remote control, etc, and they do not require python to be installed on the target machines.
I'll track progress on the project here.
-TheMadHacker