Penetration Testing mailing list archives

Re: Botnets


From: Wasim Halani <wasimhalani () gmail com>
Date: Fri, 27 Mar 2009 11:50:51 +0530

Hi Munyaradzi,

You could check out the videos on how IRC Botnets work at:

http://www.watchguard.com/education/videos.asp


Regards,

---
Wasim Halani
Security Analyst
Network Intelligence (India) Pvt. Ltd.

----------
People often hate those things which they do not know or cannot
understand. -- Imam Ali (p.b.u.h.)


On Wed, Mar 25, 2009 at 11:22 AM, M.D.Mufambisi <mufambisi () gmail com> wrote:

Hi Guys.

Can someone please explain to me how botnets use IRC? I want to make a
presentation to my group demonstrating this in my lab which comprises
of 4 winxp boxes. Unpatched. How are commands issued via IRC?

Kind regards,

Munyaradzi

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced 
Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain 
your Certified Expert Penetration Tester (CEPT) cert as well.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

No time or budget for traveling to a training course in this fiscal year? Check out the online penetration testing 
courses available at InfoSec Institute. More than a boring "talking head", train in our virtual labs for a total 
hands-on training experience. Get the certs you need as well: CEH, CPT, CEPT, ECSA, LPT.

http://www.infosecinstitute.com/request_online_training.html
------------------------------------------------------------------------


Current thread: