Mutt
Professional
- Messages
- 1,163
- Reaction score
- 827
- Points
- 113
This article is for informational purposes only!
The basis of security can be called work through virtual machines. Since we work with viruses, there is a chance, inadvertently, to launch it. The worst thing here is not that the data will get to the server after the virus has been processed, but that the real data will remain in the provider's log.
Most of all hackers come across the fact that from the very beginning they did not build security up to the end, but improved it as the virus developed. As long as you have a small network, there are no high-profile cases for you, etc., no one is looking for you. That is, you can manage a botnet of 1000 machines almost from your computer and no one will come for you. Therefore, in the beginning, hackers sit through simple single VPNs. As the network grows, they begin to attract more and more interest, and when several reports of grand theft are collected in the police, the search begins. It doesn't matter that at the time of the kidnapping, the security scheme could have improved dramatically. A chain is as strong as its weakest link. Quite often the searches end with the special services gaining access to the virus servers, searching through all the logs there, pulling out early information about the owner,
Even if the servers changed many times and the logs got confused, it is often possible to restore the whole picture. In large searches, the hacker's handwriting is analyzed.
This can be the time of attacks, viruses used, cryptor data, server hosters, etc. Having raised everything, you can often find all the logs for the entire time. And once you go in the wrong place, accidentally open a virus in the wrong place, throw a working virus on a neighbor in the entrance and this will become a gigantic security threat. Therefore, the minimum recommended security scheme: Internet via a modem, VPN (preferably Double VPN) on the host machine, virtual machine via a secure whonix network.
Server
For the first time, a low-power VPS will do.
In general, there are three categories of servers:
Regular servers
Regular servers can be found, for example, at rockhoster.com. There is payment via bitcoin. When registering regular servers, almost everywhere you will be asked for your full name, phone number, address, mail. Mail must be specified specially made for a specific case. Reliable mailer - protonmail.com, for quick registration - cock.li (it is also reliable, but there is no password recovery and additional login protection). All other data can be taken from the data generator. It is important that they really exist. Recently, in many places, data is made through geo bases, so if a name with a surname and an address looks implausible, then vps registration may be refused.
Abuse servers
The second type is abuse servers. These are servers on which some abusive services are allowed. Botnets are banned almost everywhere, but this is not a problem, if a small network, then such a network will not be banned quickly. The advantage of using an abuse server is that they will store usage data better. It is much more difficult to get logs from them, so they are a little safer, but more expensive. An example of such a service is abusehosting.net.
They have a description of those abuses that are allowed on it. Therefore, some projects related to virology can be hosted there without fear of being banned.
Servers for botnets
The third type is servers for botnets. There are guarantees that the server from its IP will work even if it receives complaints from the botnet. To effectively build a network, staging servers, fast fux techniques, toro relay and much more can be used. This is a solution in case there is medium-sized black traffic. The only drawback is the price, which starts from several hundred dollars per month. You should look for such offers on the darknet forums.
To summarize, for the first time you need to use regular servers or abusive servers. As the network grows, we turn to the abusive server botnet.
But with the hobby of the network, especially at an extremely large scale, another type of bot management is used - p2p. This allows you not to use the servers at all, but instead distribute control to the infected machines. In terms of security, this is one of the most promising areas, and they are the most scalable.
Virtual machines
It is best to prepare a separate virtual machine for testing viruses. This is done so that important information that a virus can collect from the logs does not leak to the server. It should be borne in mind that access to the server can be intercepted, so it is better not to expose your data there once again.
For the most part, work is done from a virtual
machine on windows 7. But it is also good to have a machine with windows 10 at hand. Almost all windows-based machines run under these systems. When installing windows 7 for the first time, it will not have net framework4. It is needed to run most programs, so the first step is to install it.
.net framework 4 can be downloaded without any problems from the official microsoft website.
Virtualka for tests must be connected only through the gateway.
Working directly from a single VPN when running viruses is discouraged.
After installation and configuration, you need to take a snapshot of the state of the machine.
After each test of the virus, it is advisable to roll back the changes to the saved state.
Control
For management, you can also use a separate virtual machine, the main thing is that the virus testing is carried out on a clean machine. Often you will need to connect to the server via ssh. To do this, putty ssh client can be installed in virtual windows. It supports proxies (I wrote how to get a proxy in previous articles). This ensures that even when using your own node, there will be no traces of it. ssh does end-to-end encryption, so any proxies will work, eavesdropping on them will not give any results.
The basis of security can be called work through virtual machines. Since we work with viruses, there is a chance, inadvertently, to launch it. The worst thing here is not that the data will get to the server after the virus has been processed, but that the real data will remain in the provider's log.
Most of all hackers come across the fact that from the very beginning they did not build security up to the end, but improved it as the virus developed. As long as you have a small network, there are no high-profile cases for you, etc., no one is looking for you. That is, you can manage a botnet of 1000 machines almost from your computer and no one will come for you. Therefore, in the beginning, hackers sit through simple single VPNs. As the network grows, they begin to attract more and more interest, and when several reports of grand theft are collected in the police, the search begins. It doesn't matter that at the time of the kidnapping, the security scheme could have improved dramatically. A chain is as strong as its weakest link. Quite often the searches end with the special services gaining access to the virus servers, searching through all the logs there, pulling out early information about the owner,
Even if the servers changed many times and the logs got confused, it is often possible to restore the whole picture. In large searches, the hacker's handwriting is analyzed.
This can be the time of attacks, viruses used, cryptor data, server hosters, etc. Having raised everything, you can often find all the logs for the entire time. And once you go in the wrong place, accidentally open a virus in the wrong place, throw a working virus on a neighbor in the entrance and this will become a gigantic security threat. Therefore, the minimum recommended security scheme: Internet via a modem, VPN (preferably Double VPN) on the host machine, virtual machine via a secure whonix network.
Server
For the first time, a low-power VPS will do.
In general, there are three categories of servers:
- Regular servers
- Abuse servers
- Servers for botnets
Regular servers
Regular servers can be found, for example, at rockhoster.com. There is payment via bitcoin. When registering regular servers, almost everywhere you will be asked for your full name, phone number, address, mail. Mail must be specified specially made for a specific case. Reliable mailer - protonmail.com, for quick registration - cock.li (it is also reliable, but there is no password recovery and additional login protection). All other data can be taken from the data generator. It is important that they really exist. Recently, in many places, data is made through geo bases, so if a name with a surname and an address looks implausible, then vps registration may be refused.
Abuse servers
The second type is abuse servers. These are servers on which some abusive services are allowed. Botnets are banned almost everywhere, but this is not a problem, if a small network, then such a network will not be banned quickly. The advantage of using an abuse server is that they will store usage data better. It is much more difficult to get logs from them, so they are a little safer, but more expensive. An example of such a service is abusehosting.net.
They have a description of those abuses that are allowed on it. Therefore, some projects related to virology can be hosted there without fear of being banned.
Servers for botnets
The third type is servers for botnets. There are guarantees that the server from its IP will work even if it receives complaints from the botnet. To effectively build a network, staging servers, fast fux techniques, toro relay and much more can be used. This is a solution in case there is medium-sized black traffic. The only drawback is the price, which starts from several hundred dollars per month. You should look for such offers on the darknet forums.
To summarize, for the first time you need to use regular servers or abusive servers. As the network grows, we turn to the abusive server botnet.
But with the hobby of the network, especially at an extremely large scale, another type of bot management is used - p2p. This allows you not to use the servers at all, but instead distribute control to the infected machines. In terms of security, this is one of the most promising areas, and they are the most scalable.
Virtual machines
It is best to prepare a separate virtual machine for testing viruses. This is done so that important information that a virus can collect from the logs does not leak to the server. It should be borne in mind that access to the server can be intercepted, so it is better not to expose your data there once again.
For the most part, work is done from a virtual
machine on windows 7. But it is also good to have a machine with windows 10 at hand. Almost all windows-based machines run under these systems. When installing windows 7 for the first time, it will not have net framework4. It is needed to run most programs, so the first step is to install it.
.net framework 4 can be downloaded without any problems from the official microsoft website.
Virtualka for tests must be connected only through the gateway.
Working directly from a single VPN when running viruses is discouraged.
After installation and configuration, you need to take a snapshot of the state of the machine.
After each test of the virus, it is advisable to roll back the changes to the saved state.
Control
For management, you can also use a separate virtual machine, the main thing is that the virus testing is carried out on a clean machine. Often you will need to connect to the server via ssh. To do this, putty ssh client can be installed in virtual windows. It supports proxies (I wrote how to get a proxy in previous articles). This ensures that even when using your own node, there will be no traces of it. ssh does end-to-end encryption, so any proxies will work, eavesdropping on them will not give any results.