background preloader

Computer Networks

Facebook Twitter

Creating a botnet | Hackers Handbook. This tutorial uses mIRC and other tools, which you will need to download. You can find them via google or through pirating methods listed in the Misc Hacks section of this app. Q:What is a botnet? A: A botnet is where you send a trojan to someone and when they open it a bot joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a zombie.

Depending on the source you used, the bot can do several things. Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC Takeovers. Once again depending on the bot it may be able to kill other fellow competeter bots. Theres the infected computers bots the attacker, the server, and the slave. IP CEF. TUCoPS :: Cisco. Welcome to SecurityTube.net.

Community - IT Best Practices, How-tos, Product Reviews, written by and for IT Pros. Hacking, Security Papers. Cisco академия ТУ-София - Сформиране на нови групи. Computer networking. Fundamentals of Computer Networking- Chapter 1- Part 1-Manhattan College- ECEG-796-61.