2010/06/10

How to steal a Botnet and what happen you do so?

Turpig, botnet, Command and Controller uses Mebroot HTTP phishing for injection and control (encrypted HTTP). It could intervene to 29 different applications for launching different kind of security, privacy attacks as well as data and credential thefts on victims. Researchers from UCSB managed to control this unbriddled and sophisticated systems for ten days and gathered data for about 69 GB data, containing 168,000 infections, and 8.7GB Apache log. Here are some interesting facts :-).

Video: http://www.youtube.com/watch?v=2GdqoQJa6r4
PDF: www.cs.ucsb.edu/~kemm/courses/cs177/torpig.pdf