N7nikt3
Member
- Messages
- 2
- Reaction score
- 0
- Points
- 1
I'm selling a rare Botnet for $3,500
General features:
1 Create your own DDoS network.
2 DDoS network management via the WEB interface.
3 Create rules for managing bots (in the WEB interface).
4 The ability to control each bot individually.
//-----------------------------------------------------------------
Bot Features:
1. Visibility into processes.
2 The optimal mode of operation is selected by the bot itself.
//=========
with user parves:
1 Bot is recorded by HKLM/.../Run (startup).
2 Injects its own code into the process explorer.exe .
with administrator rights:
1 Bot creates a service with its own upload.
1.1 Invisible in processes.
1.2 You haven't logged in as a user yet, but the bot is already running.
2 Injects its code into svchost.exe .
2.1 svchost.exe - usually in authorized applications in the firewall.
(some firewalls detect "forced" changes to the memory
of processes, I'm already working on a workaround...)
//=========
4 The bot is distributed as an email worm (optional).
4.1 E-mail addresses from the Outlook address book.
4.2 Is sent via the SMTP server of the infected.
//-----------------------------------------------------------------
Bot Functions:
1 Proper multithreaded HTTP DDoS.
1.1 Support for both GET and POST ddos.
1.2 Basic HTTP authorization.
1.3 Setting the ddos parameters.
2 Multithreaded ICMP flood.
3 Multithreaded IGMP flood (new exploit under WinNT)
4 Multithreaded UDP flood.
5 Bind shell.
6 Socks4 server.
7 Download and launch an arbitrary file.
//-----------------------------------------------------------------
Contact me: @FBP_1_777
General features:
1 Create your own DDoS network.
2 DDoS network management via the WEB interface.
3 Create rules for managing bots (in the WEB interface).
4 The ability to control each bot individually.
//-----------------------------------------------------------------
Bot Features:
1. Visibility into processes.
2 The optimal mode of operation is selected by the bot itself.
//=========
with user parves:
1 Bot is recorded by HKLM/.../Run (startup).
2 Injects its own code into the process explorer.exe .
with administrator rights:
1 Bot creates a service with its own upload.
1.1 Invisible in processes.
1.2 You haven't logged in as a user yet, but the bot is already running.
2 Injects its code into svchost.exe .
2.1 svchost.exe - usually in authorized applications in the firewall.
(some firewalls detect "forced" changes to the memory
of processes, I'm already working on a workaround...)
//=========
4 The bot is distributed as an email worm (optional).
4.1 E-mail addresses from the Outlook address book.
4.2 Is sent via the SMTP server of the infected.
//-----------------------------------------------------------------
Bot Functions:
1 Proper multithreaded HTTP DDoS.
1.1 Support for both GET and POST ddos.
1.2 Basic HTTP authorization.
1.3 Setting the ddos parameters.
2 Multithreaded ICMP flood.
3 Multithreaded IGMP flood (new exploit under WinNT)
4 Multithreaded UDP flood.
5 Bind shell.
6 Socks4 server.
7 Download and launch an arbitrary file.
//-----------------------------------------------------------------
Contact me: @FBP_1_777
