Sunday, February 27, 2011

Chapter 02 botnets (2)

This "owed" Bin item often do, I believe this is all the hackers of the "advantages." Security patches to fight someone else's system, which is eccentric hackers, many people find it difficult to understand. In fact, motive is very simple, after all he finally break through the fortress, to develop into their own chickens [Note: hackers will be that they have control of the computer called the chicken], certainly does not want other people are getting into the hand, so they Other possible invasion of the road all to you blocked, leaving only their own unique back door, after the intruder is only one person can come. Selfishness is human nature, hackers are people too, so no exception. So-called "friendship test" is nothing but some people used to earn the means of the eye fills entry Bin scoff at this practice has been. In real life, hypocrisy no problem, not a large watermelon on the network are so hypocritical!

    After some repair each other, items left behind a few relatively low-level bin vulnerabilities are patched, and there are several relatively low-level, he is not found, from his way, items can be inferred Bin is not how the other's technology wise, appears to be a novice, just happen to know of this vulnerability, but also happen to find yourself this "chicken."

    It seems to stop here today. Bin items such inference, according to his temper, he is not taking even a short time the machine as short as two to three months may be more than 2012 long.

    But this time they inferred the wrong key bin, he found this little guy interest unabated, even running on the server from IRCbot come. This program is able to control the IRC channel. IRC channel is equivalent to a chat room, of course, it features not only chat room that simple. Then, set up an IRC channel, Bin items found another intruder into your system, and they two were chatting in the channel to.

    Ho! These two guys quite relaxed! Item Bin felt some heavy eyelids, but he still insists that he is really interested in their chats.

    Initially, the two men (for the time being to call with h1 and h2) to discuss the establishment of a program structure and share the attack potential targets of attack used to attack programs, both with the English, the content from their point of view, h2 is completely a novice, as are the h1 to say, not so much in the discussion, as it is teaching h1 h2. H1 to h2 and then brag about how much has been denial of service attack server, how many chickens there. h2 will have to show him, then began Yongxiang Bin h1 this server to denial of service attack others, but long term Bin restrictions made on the system design when the items Bin honeypot put this issue into account, and all From here out of the attack will be blocked off. Thus, h1 h2 before they lost in the face, but he used his chickens save face, much to show off a lot, can be seen from the conversation, h2 still worship him. Then they began to share the chicken, stealing the account number and the porn sites resources. Bin items are not interested in these natural, never missing his chickens.

No comments:

Post a Comment