Skip to main content

Posts

Showing posts with the label botnet

Harmful Softwares 2022

  Software considered harmful In the sidebar on the left, you can find why i consider some points of the software bad. I don’t think minimalistic software is all the times better than bloated software. Sometimes “bloated” software is better than the alternatives. For example pale moon is more usable than surf. And sometimes extensions are useful so i don’t consider them harmful, problem is that how you write those extensions (if you read GNU source code, you’ll have a impulse to throw yourself into an active volcano). While, for example, BSD implemented those extensions in a sane way. Here’s a table with software i consider harmful and their alternaties Harmful things Less bad things KDE, Gnome i3, dwm, bspwm, Xfce Windows BSD, Linux, Haiku Vim, Vi Emacs, zile, jed YAML JSON, CVS, MacBooks Thinkpads, Toughbooks GCC clang, tcc Wayland X11 GTK, QT Tk, Curses Intel, Realtek ath9k Electron Throwing yourself to an active volcano, you c

Botnet analysis based on IRC network

With one of my many honeypots actived around the world wide web, I discovered an interesting script written with the famous Perl programming language. This Perl script is a malware used to remotely control a machine, opening what is technically called backdoor. If this malicious program runs on multiple machines, there is a possibility that the attacker may have created a botnet. At first, a botnet is a network controlled by a bots master and composed of devices infected with specialized malware, called bots or zombies (“Computer zombie”). Devices connected to the Internet within which there are vulnerabilities in their infrastructure can sometimes become part of the botnet, even if they do not have the malware installed. Through the backdoor, the botmaster can control the system via remote access. Thus infected computers can launch attacks, named, Distributed Denial of Service against other systems or perform other illicit operations. How it works is relativ