Security Basics mailing list archives
Re: Why attacker install irc after hacking?
From: James Harless <jharless () kidwellcompanies com>
Date: Thu, 20 Apr 2006 14:30:45 -0500
I believe that a large percentage of botnets are controlled through commands given over IRC. -- James Harless Network Security Engineer Kidwell Companies kCOM kE kTECH On 4/19/06 11:55 PM, "Monty Ree" <chulmin2 () hotmail com> wrote:
Hello, all. I have operated linux server for a long time. and I have found that some irc(psybnc etc) related program was installed after scan or hacking. I can't understand Why attackers installed and executed irc program? Why attackers use irc after hacking? Just chatting is not...I guess.. Thanks in advance. _________________________________________________________________ 전세계인이 함께하는 웹 메일 서비스인 MSN Hotmail을 만나 보세요. http://loginnet.passport.com/login.srf?id=2&svc=mail&cbid=24325&msppjph=1&lc=1 042 ------------------------------------------------------------------------- This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php --------------------------------------------------------------------------
------------------------------------------------------------------------- This List Sponsored by: Webroot Don't leave your confidential company and customer records un-protected. Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no obligation. See why so many companies trust Spy Sweeper Enterprise to eradicate spyware from their networks. FREE 30-Day Trial of Spy Sweeper Enterprise http://www.webroot.com/forms/enterprise_lead.php --------------------------------------------------------------------------
Current thread:
- Why attacker install irc after hacking? Monty Ree (Apr 20)
- Re: Why attacker install irc after hacking? James Harless (Apr 20)
- Re: Why attacker install irc after hacking? Mario Platt (Apr 21)
- Re: Why attacker install irc after hacking? Frynge Customer Support (Apr 24)
- Re: Why attacker install irc after hacking? Mario Platt (Apr 21)
- Re: Why attacker install irc after hacking? Gregory Boyce (Apr 21)
- Re: Why attacker install irc after hacking? Brian Beck (Apr 21)
- Re: Why attacker install irc after hacking? Philippe De Ryck (Apr 21)
- RE: Why attacker install irc after hacking? Network Security (Apr 21)
- Message not available
- Fwd: Why attacker install irc after hacking? Ben Alexander (Apr 21)
- Re: Why attacker install irc after hacking? James Harless (Apr 20)
- Re: Why attacker install irc after hacking? Michal Mlotek (Apr 21)
- RE: Why attacker install irc after hacking? Murad Talukdar (Apr 21)
- Re: Why attacker install irc after hacking? KarMax (Apr 21)