Guest User

Getting Better Slaves By Targeting Your Installs

a guest
Jul 24th, 2016
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  2. Hack Forums
  3. [TUT] Targeted Spreading - Getting Better Slaves By Targeting Your Installs
  5. +- Hack Forums (
  6. +-- Forum: Hacks, Exploits, and Various Discussions (/forumdisplay.php?fid=45)
  7. +--- Forum: Hacking Tools and Programs (/forumdisplay.php?fid=10)
  8. +---- Forum: Remote Administration Tools (/forumdisplay.php?fid=114)
  9. +---- Thread: [TUT] Targeted Spreading - Getting Better Slaves By Targeting Your Installs (/showthread.php?tid=4887229)
  11. [TUT] Targeted Spreading - Getting Better Slaves By Targeting Your Installs - Armada - 06-29-2015 09:12 PM
  13. Targeted Spreading
  14. Getting Better Slaves By Targeted Spreading Techniques
  15. Written By: ȺʁɱªÐą
  16. -1000th Post Celebration Tutorial-
  18. Introduction:
  20. In this article I am going to discuss how we can get better slaves by using targeted spreading techniques. What does this mean exactly?
  21. Although spreading techniques can vary greatly, and can be based on the type of intended target. We are going to cover the basics to spreading using software releases. And how by binding to specific types of releases we can help focus on the desired machines to be infected as slave hosts to our binaries.
  23. So let dive right in...
  25. The Classification of Users:
  27. In this article I am breaking down the classification of users in to 3 distinct groups. Each with their own pros and cons to infection and becoming a slave in your desired botnet.
  29. The Gamer:
  30. The gamer generally is between the ages of 10-25, tends to have a "Higher end" computer capable of handling the latest releases of video games, usually has a large drive capacity, lots of memory to play their games and a decently powerful CPU. These users are targeted most obviously by binding your viral binary to the latest game release and spreading it as fast as possible to torrent sites and seedboxes. New games tend to be large in file size, and users who download want their releases quickly making speed an important factor in successful distribution in this type of release.
  32. Pros:
  33. Gamer machines tend to be of the higher end in hardware comparison. Make for good mining slaves for crypto currency, or complex processing tasks.
  34. Cons:
  35. Large release sizes slow distribution down.
  38. The Home User:
  40. The Home User, is in general the most typically encountered infection when it comes to spreading. These are users whos computer knowledge is limited so the chance of a successful infection is much more likely. Home Users tend ot own "Average" Out-of-box computer builds, usually a store bought brand like Dell, HP or another "budget class" configuration. The machines are not nessisarily great for crypto mining or complex computing tasks like the Gamer, however the Home user also has its advantages as home users tend to openly store critical information on their machine making them prime targets for account theft, identity fraud or other more "black hat" activities. (Not endorsed in any way!)
  41. Home users are likely to search and download "common tools" such as WinZip, WinRAR, Accounting software, Office suites and so forth.
  43. Pros:
  44. Typically easier to infect
  45. More commonly searched releases (Winzip, WinRAR)
  46. Smaller release sizes, easier to distribute across multilpe sources and sites.
  47. Access to more typical home user data such as financial/banking/account logins/etc...
  48. Less chance of security software detecting the viral binary.
  50. Cons:
  51. Less powerful "Stock" computer machine, making for less powerful computing applications.
  52. Unreliable connectivity, Higher chance of "Bot sharing"
  54. The Corporate Client:
  56. The Corporate Client, is typically 1 of 2 users. The IT Analyst/Administrator who is trying to save a quick couple bucks on a software license. Of alternatively an end client within a corporate network. In this instance there are 2 vectors of attack.
  57. Focusing on the IT Administrator or the End User.
  58. IT Administrators will source and download Network and Application management suites. (Think "Server") This said, binding to releases of Management consoles, Network Distribution Software, or "End point" software (IE Anti virus end point software meant to be centrally managed) Ensures the correct type of user is properly targeted in this vector. End users of a corporate environment rarely have interest in the management side of the network, so they are unlikely going to download management console software.
  60. For End user targeting in this method the attacker is against best to focus on "lower end" software typical software that would be commonly used by normal every day 9-5 office drones. (Again, Winzip, WinRAR, Snagit, presentation software and email clients are all fantastic options for endpoint infection)
  62. Pros:
  63. Targeting IT Administrators using Management consoles or End point distributes has multiple advantages. Firstly, IT Analysts and Administrators that will use pirate or release software will likely push a working release out to the entire network. making getting slaves a fantastic reality. One release can easily gather hundreds or thousands of slaves in a single shot!!!
  64. Targeting the end point users minimizes detection of the virus, as the end user if they discover the virus they are unlikely to report it to IT security as they should not have been downloading pirate software to begin with.
  66. The next major advantage to targeting corporate environments is when a binary is successful at infection, the attack is likely to get access to Server classed hardware, which almost always means Lots of memory storage and multiple CPUs for processing.
  68. Further access to server classed machines also gives the added benefit of the access to the data housed on said servers.
  70. Cons:
  71. IT Administrators and Analysts are overall "Smarter than the average user" they are most likely to discovered your viral binary infection and remove it. IT Administrators also tend to be much more cautious when running executable binaries obtained from "The Wild" (Internet) and will test in developmental environments or Virtualized environments before issuing to the production environment.
  74. Well ladies and gents.
  75. I hope this was somewhat informative to some of you who might be having a hard time getting the type of infections you are looking for.
  77. ȺʁɱªÐą
  78. Black Hat
  81. * - Nikopai - 06-29-2015 09:16 PM
  83. Very nice and informative Thread. Thanks!
  85. * - MafiaServ - 06-29-2015 09:50 PM
  87. Nicely elaborated and informative post. I am sure it will help a lot of RAT'ers.
  89. Greatly appreciated. Black Hat
  91. * - Indus - 06-29-2015 10:22 PM
  93. Really good informative thread by Armada ..
  94. i'll bookmark it ...
  96. * - matisshakeris - 07-14-2015 08:43 AM
  98. Question: Can lumonisty hold a big botnet? Or any rat in that matter?
  100. * - Armada - 07-14-2015 08:46 AM
  102. (07-14-2015 08:43 AM)matisshakeris Wrote: ►Question: Can lumonisty hold a big botnet? Or any rat in that matter?
  104. Limitations come with a number of various factors.
  105. Primarily system resources.
  106. - The more powerful the system the more resources can be dedicated to the controlling application to hande the number of connections.
  108. More connections = More demand for system resources.
  110. Other limitations include your connection, and the backbone you sit on, networking considerations, and other various factors.
  112. All the main stream RATs can support a very large number of connections however, my bet is you will never hit this limitation.
  114. * - Snake Bite - 07-14-2015 05:11 PM
  116. Excellent tutorial Armada, definitely one of the best I've seen in this section. Very well organized.
  118. * - LilHackers - 08-31-2015 05:56 AM
  120. Very nice thread! Very informative, thanks a million
  122. * - sтүℓιsн - 08-31-2015 12:06 PM
  124. nicely written,will help users a lot.. cheers Black Hat
  126. * - DailyTrees - 12-02-2015 02:59 PM
  128. Very nice release! Thanks for the methods brotha Black Hat
RAW Paste Data