Security Basics mailing list archives

Re: Why attacker install irc after hacking?


From: James Harless <jharless () kidwellcompanies com>
Date: Thu, 20 Apr 2006 14:30:45 -0500

I believe that a large percentage of botnets are controlled through commands
given over IRC.


-- 
James Harless
Network Security Engineer

Kidwell Companies
kCOM  kE  kTECH



On 4/19/06 11:55 PM, "Monty Ree" <chulmin2 () hotmail com> wrote:

Hello, all.

I have operated linux server for a long time.
and I have found that some irc(psybnc etc) related program was installed
after scan or hacking.

I can't understand
Why attackers installed and executed irc program?
Why attackers use irc after hacking?
Just chatting is not...I guess..


Thanks in advance.

_________________________________________________________________
전세계인이 함께하는 웹 메일 서비스인 MSN Hotmail을 만나 보세요.
http://loginnet.passport.com/login.srf?id=2&svc=mail&cbid=24325&msppjph=1&lc=1
042 
 


-------------------------------------------------------------------------
This List Sponsored by: Webroot

Don't leave your confidential company and customer records un-protected.
Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no
obligation. See why so many companies trust Spy Sweeper Enterprise to
eradicate spyware from their networks.
FREE 30-Day Trial of Spy Sweeper Enterprise

http://www.webroot.com/forms/enterprise_lead.php
--------------------------------------------------------------------------



-------------------------------------------------------------------------
This List Sponsored by: Webroot

Don't leave your confidential company and customer records un-protected.
Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no
obligation. See why so many companies trust Spy Sweeper Enterprise to
eradicate spyware from their networks.
FREE 30-Day Trial of Spy Sweeper Enterprise

http://www.webroot.com/forms/enterprise_lead.php
--------------------------------------------------------------------------


Current thread: