The VX-Files
The VX-Files
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvz
  • Download your own local copy or check my other libre projects: Github/malcrvz
  • 📕Cybersecurity Theory
    • Index
      • Malware types
        • Viruses, worms and Trojans
        • Backdoors, Rootkits and Spyware
        • Botnets, DDoS and Spammer
        • Ransomware
        • Scareware and Adware/PUP/PUA
        • Downloaders and Launchers
        • Hacktool
        • APT - Advanced Persistent Threat
      • Social engineering techniques
        • Phishing
        • Pretexting
        • Baiting
        • Quid pro quo
        • Tailgating
      • Cryptography
        • Hash functions
        • Symmetric, Asymmetric and Hybrid cryptography
        • Digital signatures & Digital certificates
        • TLS Protocol
      • Pentesting methodology & Techniques
        • CIA Triad - Confidentiality, Integrity & Availability
        • The methodology steps
        • Pre-Engagement
        • Information Gathering
          • HTTP status codes
          • robots.txt
        • Vulnerability Assessment
        • Exploitation
          • Password cracking
        • Post-Exploitation & Persistence
          • Types of Shells
        • Privilege Escalation & Lateral Movement
        • Reporting & Remediation
  • 🐧Linux Essentials
    • Index
      • 1, 0, bits, Bytes: Units of digital information
      • User management
      • Packet management
      • Privileges & sudo
      • Passwd & Shadow files
      • Managing files, links and regex
      • find
      • Terminal/TTY
      • SSH
  • 🪟Windows Essentials
    • Index
      • CLI user management
      • CMD File management
  • 🌍Networking Essentials
    • Index
      • Windows CLI IP management
      • Linux IP management
      • Linux CLI Wi-Fi connection
  • 🕸️Network Pentesting
    • Tools
      • 1. Pre-Engagement
        • OpenVPN
      • 2. Information gathering
        • cURL & wget
        • Nmap
        • arp
        • Netcat
        • whatweb
      • 3. Vulnerability assessment
        • smbclient
      • 4. Exploitation
        • Metasploit
        • Hashcat
        • John the Ripper
      • 5. Post-Exploitation & Persistence
        • SSH
      • 6. Privilege escalation & Lateral movement
        • Possible privilege escalation vectors - Auto-enumeration scripts
      • 7. Reporting & Remediation
    • Techniques
      • Upgrade reverse shell to interactive
      • Transferring files to/from remote victim
      • Possible privilege escalation vectors - Manual checklist
    • Resources
      • Manufacturer default passwords lists
        • IP Cameras
      • Get Shells
  • 💉Web App pentesting
    • Tools
      • CeWL
      • Gobuster
      • whatweb
    • Techniques
      • Command injection
    • Resources
      • Reverse Shells
      • Bind Shells
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniques
      • Removing Linux user passwords
      • Removing Windows user passwords
    • Resources
  • 💽Disks & Forensics
    • Index
      • Getting a disk ready
      • Inodes & Sectors
      • Recover deleted files
      • BUILDING - Secure file deletion
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
Powered by GitBook
On this page
  1. Cybersecurity Theory
  2. Index
  3. Malware types

Botnets, DDoS and Spammer

Closest to a necromancer in real life!

Botnets & DDoS

Botnets are a giant network of compromised computers and specially IoT devices that are controlled by a central entity, that's called the botmaster or the C&C (Command and Control server). These infected computers become "bots" or "zombies" under the remote control of the C&C that will order them to do various (illegal)activities without even realizing they are part of the "army". The process usually has four steps:

  1. Infection: the criminal, usually using bots that scan the whole internet in search of vulnerabilities, infects tons of systems by exploiting a software vulnerability. It's common too to use massive phishing campaigns that redirect users to malicious websites. Or just a combination of the two. The big expansion of the IoT industry made this easier, because these cheap devices usually lack security but are still connected to internet.

  2. Establish control: once a device is infected, it always connects automatically to the C&C operated by the criminal. This server acts as a central point of communication to the entire botnet, where victims are always reaching for instructions unknowingly, they become part of a hive mind.

  3. Persistence: botnets can be hard to create so they are designed to be resilient and persistent, having mechanisms to resist detection and removal, making it very challenging for the average user to eradicate it or even realize it's infected.

  4. Command execution: once the zombies are listening, the criminal operator has usually two options, one being to expand the botnet even more, using mechanisms like Spammer malware to spread the infection and magnify the phishing campaign, or the other, if there are enough zombies, using them for malicious activities, the principal one always being DDoS attacks, were all the zombies request tons of petitions to a web server until it becomes saturated and can't offer service to real users. Imagine it like thousands of users trying to get to a server at the same time, in a frenzy, non-stop, for days. Then the criminal sends a mail to the company asking for a ransom in cryptocurrency to stop the attack. Although DDoS attacks can often be due to political/hacktivist causes.

Spammer

Malware usually attached to another malware that will convert an infected machine into a spam launching zombie, using its contacts to spread the infection. Have you ever had a friend send you a shady link while talking strange? To post later that day "Sorry I was hacked, nobody click the link I sent you!". That's an already infected victim acting as a zombie using its friends list. Its very tied with phishing as it's the main vector for malware to enter a system nowadays and a spammer can potentiate a phishing campaign to giant levels.

Last updated 1 year ago

📕