********RESEARCH ONLY – DO NOT TRY ANYTHING I AM ABOUT TO DO AS YOU WILL MOST LIKELY END UP IN JAIL, I DO NOT ENDORSE NOR CONDONE DoS ATTACKS OR HACKING WEBSERVERS YOU DO NOT HAVE PERMISSION TO DO SO – HOWEVER IF THEY ARE AGAINST IRAN OR NORTH KOREA I WOULD LOOK THE OTHER WAY – I TAKE IN NO WAY RESPONSIBILITY FOR ANYTHING ILLEGAL YOU ARE ABLE TO DO WITH THIS INFORMATION ******* So, basically, I did some research on DoS webshells and quickly found some popular ones such as phpDOS, Grenshell and a few other less popular labeled *PRIVATE* *NOT FOR RELEASE* which that obviously didn’t turn out well. Additionally, kiddies are arrogant and lazy so I wanted to do searches for file names that ended or included “ddos, dos, attack, stresser, packet, etc” *.php|.asp|.jsp|.cfm. But why stop there, I also wanted to include in text strings such as “Start the attack” “Flood victim” “DoS Victim” “Victim IP”, etc. So armed with some information, it was time to see if I could build a botnet, using a custom python script and a multiple TOR nodes through a VPN I could link all hacked shells and launch a single DDoS at any target I desired. So, just to prove my point, here are a few screen shots, I was able to locate 178 available bots and judging by uplinks combined they should deliver well over 50gbs/sec – maybe more. This took me less than 4 hours to build a botnet and be able to control it without hacking a thing. The internet is broken, kiddies can repeat the same type of actions and take down large networks with ease. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Capture shell Share Button Email inShare Category: DoS,DDoS,DrDoS Tags: *FOR RESEARCH* I Built a 50gbs+/sec DDoS Net using just GOOGLE Without Hacking Anything

********RESEARCH ONLY – DO NOT TRY ANYTHING I AM ABOUT TO DO AS YOU WILL MOST LIKELY END UP IN JAIL, I DO NOT ENDORSE NOR CONDONE DoS ATTACKS OR HACKING WEBSERVERS YOU DO NOT HAVE PERMISSION TO DO SO – HOWEVER IF THEY ARE AGAINST IRAN OR NORTH KOREA I WOULD LOOK THE OTHER WAY – … Read more

The evolution of Denial of Service attacks into Distributed and Reflected extremely devastating attacks

A Denial of Service (DoS) attack is one in which an attacker is able to disrupt and deny a computer or servers the normal quality of service they should experience. Many of the first types of attacks were done as pranks and mostly considered harmless fun or just annoying to the victim. These initial DoS … Read more

Androm Trojan Downloader Loads Zusy Emotet Banking Trojan Malware PCAP file download traffic sample az.exe 11.exe

50 engines detected this file SHA-256 5831264367b6ee1636606b2d9f46111cb7ab4b3b007e49e2f921df5f7d484f06 File name output.112714662.txt File size 128 KB Last analysis 2018-01-24 18:48:00 UTC Community score -1 VBA32 Backdoor.Androm VIPRE Trojan.Win32.Generic!BT ViRobot Trojan.Win32.Agent.131072.EN Webroot W32.Trojan.Emotet 37 engines detected this file SHA-256 b134507e22448a801b8a6d1fa6bc32a7d4b389afb15ec721b83e24bdde2e61e1 File name az.exe File size 409.5 KB Last analysis 2018-01-22 06:22:47 UTC Endgame malicious (high confidence) eScan Gen:Variant.Zusy.272363 … Read more

Webcam Blocker Pro Protect your audio and video inputs! Prevents unauthorized access to your webcam or microphone device

Webcam Blocker Pro Protect your audio and video inputs! Prevents unauthorized access to your webcam or microphone device without your permission Works on all laptop or desktop webcams or microphones, both built in and external $24.95 for lifetime license (limited time only) Advanced security Uses password protection to block access and uninstall Over 12 thousand… … Read more

Windows Password Resetter Recovery for Windows NT, 2000, VISA, XP, 7, 8 and 8.1

How to Recover a Locked Computer Password and Regain Access in Under 5 Minutes. Support for Windows NT, 2000, Vista, XP, 7 (all Editions) and Windows 8 / 8.1 If you’ve ever forgotten your computer password, you’ll know how frustrating it can be. No emails, no internet and no files – in fact, no nothing, … Read more

Network Forensic Tool Python Script to Analyze SYN packets uses PCAP and TSHARK

This script is used for forensic analysis to analyze SYN packets – requires pcap file and tshark   ================================================================================================= analyse_syn_packets.py ================================================================================================= import numpy,sys from subprocess import Popen, PIPE “”” Script to calculate how often a ip or tcp field changes in a pcap file for a specified destination ip address and port. Usage: python analyse_syn_packets.py … Read more