Security Basics mailing list archives
Re: Why attacker install irc after hacking?
From: Michal Mlotek <mlotek () foobar pl>
Date: Thu, 20 Apr 2006 23:10:14 +0200 (CEST)
On Thu, 20 Apr 2006, Monty Ree wrote:
Hello, all. I have operated linux server for a long time.and I have found that some irc(psybnc etc) related program was installed after scan or hacking.I can't understand Why attackers installed and executed irc program? Why attackers use irc after hacking? Just chatting is not...I guess..
You're close. IRC in this case is a way for controlling hacked system. It is more simple to control many such systems via IRC than to connect each one. When you have a group of systems listening for commands you do not have to burden yourself with giving commands separatedly, no need for checking how many systems has been repaired etc. You just control one IRC channel.
Of course it is possible to do that another way, but why bother if you have ready tool in your grasp
Thanks in advance.
You're welcome. -- Michal Mlotek All my opinions are my opinions. ------------------------------------------------------------------------- This List Sponsored by: WebrootDon't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks.
FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php --------------------------------------------------------------------------
Current thread:
- Why attacker install irc after hacking? Monty Ree (Apr 20)
- Re: Why attacker install irc after hacking? James Harless (Apr 20)
- Re: Why attacker install irc after hacking? Mario Platt (Apr 21)
- Re: Why attacker install irc after hacking? Frynge Customer Support (Apr 24)
- Re: Why attacker install irc after hacking? Mario Platt (Apr 21)
- Re: Why attacker install irc after hacking? Gregory Boyce (Apr 21)
- Re: Why attacker install irc after hacking? Brian Beck (Apr 21)
- Re: Why attacker install irc after hacking? Philippe De Ryck (Apr 21)
- RE: Why attacker install irc after hacking? Network Security (Apr 21)
- Message not available
- Fwd: Why attacker install irc after hacking? Ben Alexander (Apr 21)
- Re: Why attacker install irc after hacking? James Harless (Apr 20)
- Re: Why attacker install irc after hacking? Michal Mlotek (Apr 21)
- RE: Why attacker install irc after hacking? Murad Talukdar (Apr 21)
- Re: Why attacker install irc after hacking? KarMax (Apr 21)
- RE: Why attacker install irc after hacking? Goran Pizent (Apr 21)
- Re: Why attacker install irc after hacking? xun dong (Apr 21)
- Re: Why attacker install irc after hacking? kalpin (Apr 24)
- <Possible follow-ups>
- Re: Why attacker install irc after hacking? jacco (Apr 21)
- Re: Re: Why attacker install irc after hacking? oldgrue (Apr 21)
- RE: Why attacker install irc after hacking? Jordan.Dallas (Apr 21)