Penetration Testing mailing list archives

Re: Botnets


From: "sr." <staticrez () gmail com>
Date: Fri, 27 Mar 2009 12:03:12 -0400

The botnets will log into a usually private IRC channel, (as a bot)
and start issuing commands. IRC is also used to distribute links to
personal information that the botnets gather. Like, dishing out
compromised credit card numbers. These channels are usually by invite
only, or require a key.

fabrizio

On Wed, Mar 25, 2009 at 1:52 AM, M.D.Mufambisi <mufambisi () gmail com> wrote:
Hi Guys.

Can someone please explain to me how botnets use IRC? I want to make a
presentation to my group demonstrating this in my lab which comprises
of 4 winxp boxes. Unpatched. How are commands issued via IRC?

Kind regards,

Munyaradzi

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced 
Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain 
your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

No time or budget for traveling to a training course in this fiscal year? Check out the online penetration testing 
courses available at InfoSec Institute. More than a boring "talking head", train in our virtual labs for a total 
hands-on training experience. Get the certs you need as well: CEH, CPT, CEPT, ECSA, LPT.

http://www.infosecinstitute.com/request_online_training.html
------------------------------------------------------------------------


Current thread: