Security Basics mailing list archives

Re: Re: Why attacker install irc after hacking?


From: oldgrue () gmail com
Date: 21 Apr 2006 15:29:28 -0000

Many botnets do exactly that - use an IRC client to execute remote commands.  I'm surprised they didn't make it ride 
and alternate data stream, to hide it from most users.

-------------------------------------------------------------------------
This List Sponsored by: Webroot

Don't leave your confidential company and customer records un-protected. 
Try Webroot's Spy Sweeper Enterprise(TM) for 30 days for FREE with no 
obligation. See why so many companies trust Spy Sweeper Enterprise to 
eradicate spyware from their networks.
FREE 30-Day Trial of Spy Sweeper Enterprise

http://www.webroot.com/forms/enterprise_lead.php
--------------------------------------------------------------------------


Current thread: