当前位置:网站首页>Internet of things botnet gafgyt family and backdoor vulnerability exploitation of Internet of things devices
Internet of things botnet gafgyt family and backdoor vulnerability exploitation of Internet of things devices
2022-06-30 21:11:00 【Qianli ZLP】
One 、 Virus introduction
Gafgyt( also called BASHLITE,Qbot,Lizkebab,LizardStresser) It's based on IRC Internet of things botnet program , Mainly used to initiate DDoS attack . It can take advantage of the built-in user name 、 Password dictionary telnet Blasting and righting IOT equipment RCE( Remote command execution ) Exploit vulnerabilities to spread themselves . On 2015 The source code was leaked and uploaded to github, Since then, many varieties have been derived , The next year on the Internet IOT The total number of infections on the equipment reached 100W.Gafgyt The family has initiated a peak 400Gbps Of DDoS attack . By 2019 end of the year ,Gafgyt The family is still apart from Mirai The largest active IOT botnet family outside the family .
Two 、 Function module
Gafgyt family bot The main functions of the program are divided into 3 A module :
1、Downloader modular . Hard coded by samples url download shell Scripts and other accompanying samples , Then execute the downloaded scripts and samples , Realization bot Program propagation ;
2、Scanner modular .bot After the program runs , First, the first packet will be sent to the control end , And this first package and the usual botnet There is a big difference in the first package of the virus family , common botnet The first package of the virus family contains information such as system configuration , and Gafgyt The first packet of data is “BUILD RAZER.”, The control end usually replies “!* SCANNER ON”, Command the controlled end to follow
边栏推荐
- DM8:生成DM AWR报告
- 代码改变一小步,思维跨越一大步
- Peking University ACM problems 1002:487-3279
- stacking集成模型预测回归问题
- 个人开发的渗透测试工具Satania
- Open source internship experience sharing: openeuler software package reinforcement test
- mysql-批量更新
- 我想知道股票开户要认识谁?另外,手机开户安全么?
- 文本生成模型退化怎么办?SimCTG 告诉你答案
- Peking University ACM problems 1003:hangover
猜你喜欢

Lumiprobe cell biology - dia, instructions for lipophilic tracer

Adobe Photoshop (PS) - script development - remove file bloated script

Analysis of breakpoint continuation and download principle

多表操作-外键约束

1.微信小程序页面跳转方法总结;2. navigateTo堆栈到十层不跳转问题

关于,奇安信检测代码漏洞,XSS系列解决

Lvalue reference and lvalue reference

MySQL:SQL概述及数据库系统介绍 | 黑马程序员

uniapp怎么上传二进制图片

Apply for vector bus protocol color picture wallpaper hanging picture, very good!
随机推荐
文本生成模型退化怎么办?SimCTG 告诉你答案
ArcGIS构建发布简单路网Network数据服务及Rest调用测试
雷达数据处理技术
升级kube出现unknown flag: --network-plugin
Metauniverse may become a new direction of Internet development
我想知道股票开户要认识谁?另外,手机开户安全么?
Text recognition svtr paper interpretation
等级测评是什么意思?工作流程包含哪些?
减少嵌入式软件调试时间的三个技巧
报错:Internal error XFS_WANT_CORRUPTED_GOTO at line 1635 of file fs/xfs/libxfs/xfs_alloc.c.
Auto-created primary key used when not defining a primary key
大学生研究生毕业找工作,该选择哪个方向?
Label Contrastive Coding based Graph Neural Network for Graph Classification
On the charm of code language
多表操作-外键约束
Introduction of 3D Max fine model obj model into ArcGIS pro (II) key points supplement
企业保护 API 安全迫在眉睫
Learning summary
MySQL advanced 3
Peking University ACM problems 1006:biorhythms