Search results

  1. Ghosthunter

    Installing and configuring a botnet

    The botnet is installed, then you need to configure it. HEADING=3]Botnet Configuration[/HEADING] In order for the botnet to be configured correctly, we need to get our API ID and API HASH. To do this, you need to create an app on the site my.telegram.org. First, log in under your account...
  2. Ghosthunter

    Installing and configuring a botnet

    Open PowerShell again with administrator privileges and run: Code: wsl --set-default-version 2 Installing the Ubuntu distribution on WSL2 Open the Microsoft Store and enter the word "linux"in the search. Then find the" app " called Ubuntu 20.04 LTS and download it. After installation...
  3. Ghosthunter

    Installing and configuring a botnet

    Guide Navigation Installing a botnet on Android Installing a botnet on Linux (Debian-based) Installing a botnet on Windows (Wsl2) Installing a botnet on Linux (Arch-based) Installing a botnet on macOS Universal installation on Linux Botnet Configuration Starting and adding sessions FAQ If...
  4. Ghosthunter

    Botnets. Preparation and launch.

    Whatever the coder refers to, it's all in favor of the poor. What reviews, what reputation - everything is not about us. Sorry, but it's not interesting. To prepare you for reality, I also want to say the following not very popular thing: the real average lag today is about 35, maybe 40%...
  5. Ghosthunter

    Botnets. Preparation and launch.

    If you have VNC, repeat the procedure. Moreover, we test the functionality of the software and its individual modules AGAIN on all versions of the operating system and from all browsers! This is a megahemore, but it HAS TO BE DONE. Otherwise, you will lose your money and nerves. Curse me...
  6. Ghosthunter

    Botnets. Preparation and launch.

    Introduction and structure of expenses. I will probably omit the importance of basic precautions. I will assume that everyone present knows how to minimally protect themselves online. So, your first botnet. It is very important that you understand why all this is happening. The botnet is...
  7. Ghosthunter

    Botnets. General concepts, classification, and monetization of botnets.

    The next truly interesting area is adware I must say right away that advar is all the software that shows or forces the user to click on the displayed ad. Don't confuse it with an autoclicker. Advar, as you guessed, can work on its own. It doesn't need a botnet. But we are also looking at...
  8. Ghosthunter

    Botnets. General concepts, classification, and monetization of botnets.

    DDoS Also, all these machines can, suddenly, simultaneously access some site and " put " it. Everyone knows DDoS. The most common attacks of this type are TCP SYN and UDP attacks. DDoS attacks are not limited to web servers. They are often directed at a variety of services that are connected to...
  9. Ghosthunter

    Botnets. General concepts, classification, and monetization of botnets.

    General concepts From a linguistic point of view, the word "botnet" includes two words: "robot" and "network". A botnet is a collection of systems infected with malicious code and administered centrally. In other words, a network of computers that are controlled remotely by intruders. Very...
  10. Ghosthunter

    Detailed manual: botnet

    Ready-made botnet So, the tests are done, the necessary Trojan is found, the servers are paid, downloads are dripping, but still not so fabulous. Now I will tell you about a few more nuances that you will have to face. Fresh logs. When you buy accounts from a seller, of course you ask for an...
  11. Ghosthunter

    Detailed manual: botnet

    If you don't know what a botnet is, then this article probably won't be very useful to you. But if you have ever thought about raising your botnet, it will help you avoid stepping on the same rake that most people face. So, let's get started! Topic The botnet is always taken under the theme...
  12. Ghosthunter

    Dangerous botnets, and what is known about them. Examples of threats.

    Examples of the most famous botnets in the world Below are the most extensive criminal botnets that have caused or are causing great damage to both commercial companies and ordinary citizens from countries around the world. The status of whether the network is currently active or not is not...
  13. Ghosthunter

    Dangerous botnets, and what is known about them. Examples of threats.

    Have you ever heard of such a concept as a botnet? If not, then there's nothing strange about it. For any ordinary Internet user, this is normal. Because the intent of cybercriminals lies precisely in this. They do not bring anything but trouble, so it is better to never encounter them at all...
  14. Ghosthunter

    Learning how to bypass two-factor authentication (Google Authenticator, SMS)

    Checking the settings: We specify where we will redirect the user after successful authorization Code: phishlets get-okta url https://<target domain>.okta.com/ The app will display a link that you want to send out to users in the following format:https://<phishing...
  15. Ghosthunter

    Learning how to bypass two-factor authentication (Google Authenticator, SMS)

    After collecting this and a couple of other requests, we get the following settings:: Code: sub_filters: - {triggers_on: '<target domain>.okta.com', orig_sub: '<target domain>', domain: 'okta.com', search: 'https://{hostname}/api', replace: 'https://{hostname}/api', mimes: ['text/html'...
  16. Ghosthunter

    Learning how to bypass two-factor authentication (Google Authenticator, SMS)

    There are times when you need to make someone happy. It happens when the target organization has a second authentication factor configured — sms, Google authenticator, or Duo. What should I do in such cases? Hire gopniks? Cut employees ' phone numbers? No! It turns out that cunning hackers have...
  17. Ghosthunter

    Traffic arbitration. The basics.

    I have prepared a series of articles that have one main task in mind: Explain in simple and understandable language how a novice can start earning at least the average salary in the all world in this niche on traffic arbitration. The material is quite voluminous, it is definitely not possible...
  18. Ghosthunter

    RedLine Stealer distributed via NPM — a new threat for developers?

    Behavioral factor of the malware carrier There is no need for a full-fledged dynamic analysis here. Redline is simpler than a ballpoint pen in this respect. Therefore, I will simply list the main criteria by which you can determine whether your car is infected with this malware or not. I note...
  19. Ghosthunter

    RedLine Stealer distributed via NPM — a new threat for developers?

    Briefly about data theft from the Chrome browser After these simple and typical malware manipulations, Redline starts its main function-data theft. First, the virus receives commands from the C&C server operator that use the ScanningArgs class, which contains a list of plug-ins. For example, an...
  20. Ghosthunter

    RedLine Stealer distributed via NPM — a new threat for developers?

    A shellcode is a part of the code embedded in a malicious program that allows you to get the command shell code after infecting the target system of the victim. Very often, shellcode is used as an exploit payload. We open the hunt for ShellCode: what's inside? To detect and capture it, we will...
Top