Secrets of a botnet developer

Web Workers

Article from Issue 145/2012
Author(s):

Botnets aren’t all bad. We’ll show you how to harness the power of the botnet architecture to solve realworld problems in a business context.

A few years ago, I developed a commercial botnet, also known as a sniper. This sniper botnet automatically purchased vehicles from a website. It also arranged for payment and scheduled shipping to my client, a very reputable automotive dealership. Although the first live test was unsuccessful, I quickly found the problem and composed an email to indicate that we were ready to try again. The email read something like this…

Dear Client, The snipers are in place and they’re going to fire at cars today, starting at noon. Hopefully they’ll hit something today …!

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Botnet of Linux Servers with Dynamic IP Discovered

    A Russian Web developer has found a network of a couple of hundred Linux servers that could distribute malware to Windows systems.

  • Psyb0t Attacks Linux Routers (Update)

    A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.

  • Psyb0t Attacks Linux Routers

    A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.

  • News

    Updates on technologies, trends, and tools.

  • Million Linux Kernels Simulate Botnet

    The biggest botnet to date is being virtualized using a network of one million Linux kernels. The virtual machines form an experiment in studying the origins of the malware.

comments powered by Disqus