I'm a zombie-I don't want to be a zombie

Source: Internet
Author: User

Related Articles:

I'm a passer-by-side attack http://www.bkjia.com/Article/200812/30776.html

By: linzi
Communication won't be left alone. You can come up with good suggestions: D

Example:
I usually search for BOTs in combination with google earth. First, locate the desired regions, such as Beijing and Shanghai,
HK, TW, KR, JP, USA, Southeast Asia, etc.

At this time, tracert can draw the topology of the backbone network in each region, and then
Play the game on google Maps and start searching for bots.

The bots found in this way are definitely not very good. The bots on the backbone network are definitely first-class, and the configuration is
On the other hand, broadband is definitely awesome.

When you have a lot of botnets, you can consider building a platform.
Similar to the bots manager.

At this time, you have to use the macro idea.
Third-party programs, operating systems, versions, Administrator usernames, database usernames, and so on.

After collecting the information, you can start to build many platforms.

Anti-Virus platform:
Assume that you want to check whether your horse is killed. You can easily find out if KAV is installed on your platform.
What machines are there, what are the nod32 and what are the red umbrella.

These are the so-called virus platforms.

Debugging platform:
Now, you can easily find South Korea, Chinese, Japanese, English, 2 k, 2k3, and vista.
Xp and so on, you can immediately test the environment in which your horse is OK. Generally, it is in the virtual
This is done only after debugging. Otherwise, the BOT will be lost, and the blue screen is too serious to drive, which is more disgusting than Furong JJ ..

"Honeypot" Platform:
In this case, you can choose to record the key disks of different types of machines.
A large number of virus samples, useful tools, and analysis of other hacker penetration techniques, many
Wait, others' methods are much more advanced, so it is worth learning. We will build our own happiness on others' depressing feelings...

Analysis Platform:
Different places, different operating systems, different administrators, and different types of Administrators
You can obtain analysis reports through technical means. When you have these reports and penetrate different types of sites, you
You can easily know what the Administrator will check, how to check, and whether to change the penetration habits of the platform.
Third-party software statistics are also very helpful. You can know the habits of administrators in different regions, such as Koreans.
Like to use ftp, like to use ahnlab, do not use winrar, his password is usually used to Korean into English and so on.
These are all very useful. For example, quick time is preferred for American PCs, while symantec and
For coffee sales, the password length of the Korean hacker is generally 12 characters. The password habits of Chinese people engaged in stocks are as follows:
Password Length, rules, etc...

Brute-force platforms:
You can see the xmd5 mode and save the hash as a zombie. For example, when you have
A lot of bots, you can use them to crack winrar, winzip, office, md5, sha, etc.
Online semi-finished tools, such as xdoor

Proxy platform:
Sslvpn, sslproxy, vpn, etc. Please use your imagination ....
If your coding capabilities are sufficient, you can write a cool management software.
Click Beijing, then Shanghai, then south Korea, and then rice. At this time, the program will
It will automatically calculate which bot you need to connect first, which one should be connected, and then google
The form of earth, such as the film-style column, so cool ~~~~

DDOS platform:
By the way, it's a big bad guy .....

Other platforms ....
Use your imagination .....

Every time I open google earth, my friend says, my eyes are green, because I always think
It's all about bots, all about the best bots, all about vpn .....

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.