Tuesday, March 1, 2011

Chapter 3 Botnet (1)

H1 continues to boast, but item ag.bone also know that what he said botnet isn't his, but his teacher. This can also understand, network development up to now this stage, everybody's network safety consciousness are raised, to get and control a botnet is not an easy thing, even item ag.bone, each thinks he has the ability to control the amount of, but cannot guarantee. And, according to the h1 of conversations, his master control of the botnet unexpectedly attain 2000 computers, is almost around the world, it is not simple.

H2 obviously does not know a botnet is nothing so h1 spent a lot of time to explain, item ag.bone also know they the botnet main purpose - to make money.

These have been poisoned by remote control computer and reach a certain quantity is formed after the botnet, often by the hacker to wage large-scale network attack, such as mentioned before others, and forwarded DDos liquor spam, to damage the target network congestion, make not normal use of network resources. Control these computer "worms masters" by computer owners blackmail. Their goal is usually each big Internet companies or large sites, so will blackmail thousands of dollars of protection, if the victim dishonored it, they will command botnets in computer manufacturing various boring accidents, make the computer paralysed, caused a lot of capital losses. This has been very eyes of the network crime, so risk degree is very big, many big companies often can choose dishonored reimbursement, alarm in their fight against crime.

And they are not directly to blackmail other people, but took a sovereign manner, even all have to admire the other items ag.bone really smart, and do so risk almost negligible. They to bots orders, let under his command, the computer "slave" began to download and install the software that is called adware, once installed on the computer, advertising software will enable computer automatic popup ads, and record the user's on-line browsing habits - they just use this method to get advertising revenue. Of course, such income than those who blackmail simply for negligible, every month about thousands of dollars of appearance, but such a small risk, because by an attacker generally is users, their or don't know their machines have poisoning, or take conveniently off pop-up of negative coping attitude, most is to kill the poison, no one would think of own machines have called others used to make money tool; Besides, even know, also won't and can not how.

In these two rowdy little chat is huan, item ag.bone has tracked h1 IP address.

Ha ha, this guy, but also really suffices cautious, intermediate unexpectedly after three times transshipment, calculate you qualified! Item ag.bone thought foreign hackers quality is higher, which be like domestic those blundering boy, even the conceal himself whereabouts are not clear the principle of couldn't wait to take someone else's tools to attack someone else.

But it is also the hacker unlucky, drill into an elaborate honeypot, and met item ag.bone this BT and believe this lesson will let him unforgettable.

Into this Australian hackers system item ag.bone fee the bit, after all invasion of the personal computer and intrusion server completely are two different things. The server must provide network service, to provide the web server will have to open some necessary port, such as common HTTP protocol of port 80, remote login the 3389 port, and FTP protocol 21 port. And personal computers will be different, it doesn't like outside providing services, also means that it can not only "into a", can see the system makes too precautions.

No comments:

Post a Comment