+

Hakin9 Extra – Botnet 05/2011

October 17, 2011


Hakin9 Botnet

Hakin9 Botnet

A study of a Botnet creation process and the impact of a DDoS attack against a web server
by Stavros N. Shaeles and Ioannis D. Psaroudakis

Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building such a botnet is to use it as a penetration platform for stress testing a server.

ZeuS Botnet
by Rick Messier

While security professionals have been working hard to keep up with security fixes and coding practices, those with malicious intent haven’t been resting on their laurels. The every-present analogy of the cold war arms race is appropriate. You’ve probably read the headlines about the number of bank accounts that have been stolen. Being a criminal using computers has probably never been easier than it is right now.

Botnet That Dial Home
by Itzik Kotler

Botnet that call home are nothing to write about, but botnet that dial home are. VoIP security is not only about exploiting vulnerabilities, cracking accounts, and eavesdropping. It’s also about remote controlling a computer, extracting data, and having an alternative access to the Internet. The very same technology that makes VoIP so flexible and enabling – can be turned around and used by hackers.

Botnet, the right hand of the criminals!
by Orlando Pivi

The Botnet is a series of computer infected (now called zombies) that they can be used for malicious intentions as DDoS attack, spam campaings and others. Hackers also steal private information and data from their victims by fake log-in pages and other kind of malwares.

Botnets for Fun and Profit
by Scott Everard

The internet recreational sandbox started off as a social hangout for bored teens, computer science and engineering students, as well as savvy intellectuals with too much time on their hands (hackers) and it has emerged as a profit-driven environment for criminals

Social Network Security
by Mubashir Ismail CISSP, CISA, CISM

With the advancement of the technology, especially in the internet and telecom sector, social networking is becoming one of the key areas to connect with other people and share information. These communication tools and technology provides a mechanism for free information flow and people access this information through mobile devices, websites and various applications.

What is a botnet
by Anuj Soni

Of course, any network connected resource could be put in the cross-hairs. The “distributed” nature of a DDoS attack means that there are multiple sources of the attack. This minimizes the likelihood that any single host can be singled out as the perpetrator, and it also makes it more difficult for the victim to block the offending traffic. The architecture of a botnet lends itself very well to this kind of attack, as botnets are typically geographically dispersed, and so they cover a large range of subnets and IP addresses.

Top 10 iPhone Security Tips
by Kunjan Shah

Although vulnerabilities identified against iOS make all the users equally vulnerable, there are certain vulnerabilities that only target jailbroken iPhones. For example the Dutch Ransom worm targeted users with the default SSH password on jailbroken iPhones. Thus, using a jailbroken device may increase your risk.

Comments

Tagged with:

Leave a Comment

Please keep in mind that comments are moderated and rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.

You must be logged in to post a comment.


IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa