botnet : Introduction and how to create.


Introduction - 
The word "botnet" is the combination of two words first is "robot" and second is "network". botnet is a group of many Internet accessible computers, each of these running one or more than one bots. Botnet can used to perform distributed denial-of-service attack (DDoS attack), steal sensitive data, send spam to anyone, and allows the hacker to grant access the device and its controls. The creator  can run the botnet using command and control (C&C) softwares.


We just targeted a clean Window virtual machine we’d set up. To control the bot, we create own command-and-control system by spinning up a LAMP server on Amazon Web Service’s (AWS)  EC2 platform. (we have used EC2 for its convenience; we could just as easily have perform the demo from a real physical server right there in his workplace.


How To Build A Botnet

Opening  browser (Chrome, Mozilla Firefox, Opera...)

Search for botnet-builder-tool known as Ice IX
Using tuts and tools which can be easily found by online search engines, a botnet creator can create a central command and control server.

Now you need to use social engineering to inject malware into the victim’s System—by, exciting offer, emailing, or trick a user into downloading the file from a insecure website.
After downloading and installing the Ice IX kit software,  start bot builder feature and  set up the parameters like , how it communicate with the command server, how it hide from anti-virus scans, etc...
edit the Ice IX kit’s powerful setup.txt script.  commands in this script that coordinates malware to take screenshots of pages that were visited by the victim machine’s browser such as a bank web site. malware can block sites on  victim machine’s browser. It can also redirect  site URLs to other sites to collect critical information—credit card numbers, Social Security numbers, passwords. You name it.
Once we’d setup all the malware’s features, like location of its controlling command server,  uploaded Ice IX-produced files to  LAMP server. How we have fully configured botnet command server.

Congratulations On Your New Botnet!

Making the botnet and command server is  half of the equation. Next task is encrypting and packing the infected file that will deliver with bot-installation package on the target PC, The file is usually a PDF or document file, users will click without thinking when found with a phishing email or misc website.
The delivery file is created by a ‘crypter and packer software, It sent to the target with the social engineering.
After delivering the malware package, user run by double-clicking it, package appears as PDF/document. The file suddenly vanished from the desktop; its package running invisibly in background process , installing the bot software and seizing control. An user completely unaware that his/her system had just been infected.

The Bot Goes To Work

Suppose someone had just zombified a corporate PC. What happens next?
It  can 

  • Read email 
  • monitor traffic source and communicate, 
  • Sniffing passwords,
  • identify databases
  • etc...


And if we needs to give our zombies new features, all the botmaster need to upload new malware packages to the infected computers. 
And creating a botnet like this. You need some knowledge that how webservers are constructed? , familiar in back-end databases ex:- MySQL for managing the info. stored on websites.




Enjoy! Follow us for more...

Comments

  1. Baccarat – Guide for Beginners - Wanderlust
    A casino 바카라 사이트 game is when you take part in a หาเงินออนไลน์ baccarat game, and the dealer will try to find the In other words, this casino deccasino game involves betting on which of

    ReplyDelete
  2. Best Ways to Get From Casinos to Casino
    Casino sites are 청주 출장샵 operated 군산 출장마사지 by various players and have varying degrees of experience, however, they all have 김포 출장샵 different 군산 출장마사지 game types, Aug 11, 2021 · Uploaded by 울산광역 출장마사지 Casino World

    ReplyDelete

Post a Comment

Popular posts from this blog

[Termux] ... How to Remove termux Welcome screen Text

How to change fonts/Colors in termux app.

How to Insert ANCII txt in your termux terminal ?