lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAN6dqzkqVXSwawbkYDxYyriQPagJgPY4vZbw6YjqT1yE0kLLoQ@mail.gmail.com> Date: Fri, 16 Sep 2011 10:38:16 -0500 From: RandallM <randallm@...mail.com> To: full-disclosure@...ts.grok.org.uk Subject: understanding the botnet C&C.. hi an area that I am basically "stupid" on is botnets. Not what they are but "how" they work through IRC as the control center. Not just that but the various modern programs used. I am aware for instance LOIC can be used to connect to an IRC channel.. but, how then does the "herder" do the job from IRC..how does he issue commands that all the computers connected act upon, etc. ? My curiosity has just got the best of me and I would like some pointers to good material that can feed it. Sorry for the "troll" like post but I really would like to understand this further. Have done a number of Google searching but have hope someone here has done personal research. -- been great, thanks RandyM a.k.a System _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists