Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "botnet"
-
De-google your life
Search:
-qwant
-startpage
-searx
-duck duck go look up the founder
-yandex (putin botnet)
Mail
-cock.li
-ProtonMail
-Posteo
-Tutanota
-your own
Browsers
-https://kek.gg/i/3g2z6d.png (superior list)
-https://kek.gg/i/67YQQx.jpg (for furfags)
-https://wiki.installgentoo.com/inde...
/Web_browsers
Collaborative documents
-quip
-turtl
-ether pad (eg: notes.typo3.org or etherpad.net)
-microsoft office online (lol)
Image Upload/Edit
-kek.gg
Video sharing
-hooktube
-bitchute.com
-vid.me
-dtube.video
Social
-gnu social (for freedom loving patriots)
-mastodon (for proprietary loving gook pedos and sjws)
-gab.ai
-minds
-diaspora
Image Upload/Edit
-kek.gg
Google CDN avoidance
-Decentraleyes
Ad and script blocking
-uBlock Origin
Share links without gibbing clicks
-archive.is
Android
-droid-break.info
How to hosts file (lol, just block google bro):
-https://archive.is/gBJ8i
Reading:
-https://wiki.installgentoo.com/inde...
/Anonymizing_yourself#Fingerprinting
-https://wiki.installgentoo.com/inde...
/Firefox#Notable_add-ons
-https://panopticlick.eff.org77 -
To whoever is spending their entire botnet on ddosing my project: its working, you successfully took down a 25 line api running on a free heroku dyno, you can stop now.11
-
A group of Security researchers has officially fucked hardware-level Intel botnet officially branded as "Intel Management Engine" they did so by gathering it all the autism they were able to get from StackOverflow mods... though they officially call it a Buffer Overflow.
On Wednesday, in a presentation at Black Hat Europe, Positive Technologies security researchers Mark Ermolov and Maxim Goryachy plan to explain the firmware flaws they found in Intel Management Engine 11, along with a warning that vendor patches for the vulnerability may not be enough.
Two weeks ago, the pair received thanks from Intel for working with the company to disclose the bugs responsibility. At the time, Chipzilla published 10 vulnerability notices affecting its Management Engine (ME), Server Platform Services (SPS), and Trusted Execution Engine (TXE).
The Intel Management Engine, which resides in the Platform Controller Hub, is a coprocessor that powers the company's vPro administrative features across a variety of chip families. It has its own OS, MINIX 3, a Unix-like operating system that runs at a level below the kernel of the device's main operating system.
It's a computer designed to monitor your computer. In that position, it has access to most of the processes and data on the main CPU. For admins, it can be useful for managing fleets of PCs; it's equally appealing to hackers for what Positive Technologies has dubbed "God mode."
The flaws cited by Intel could let an attacker run arbitrary code on affected hardware that wouldn't be visible to the user or the main operating system. Fears of such an attack led Chipzilla to implement an off switch, to comply with the NSA-developed IT security program called HAP.
But having identified this switch earlier this year, Ermolov and Goryachy contend it fails to protect against the bugs identified in three of the ten disclosures: CVE-2017-5705, CVE-2017-5706, and CVE-2017-5707.
The duo say they found a locally exploitable stack buffer overflow that allows the execution of unsigned code on any device with Intel ME 11, even if the device is turned off or protected by security software.
For more of the complete story go here:
https://blackhat.com/eu-17/...
https://theregister.co.uk/2017/12/...
I post mostly daily news, commentaries and such on my site for anyone that wish to drop by there19 -
"Pre-Installed Malware Found On 5 Million Popular Android Phones"
"added somewhere along the supply chain"
See below how to check if it's installed
Sources:
- (new) https://thehackernews.com/2018/03/...
- (new) https://research.checkpoint.com/rot...
- (old relevant news) https://thehackernews.com/2017/03/...
---
"Rottensys" a malware which covers devices from: Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE
---
"According to our findings, the RottenSys malware began propagating in September 2016. By March 12, 2018, 4,964,460 devices were infected by RottenSys," researchers said.
"At this moment, the massive malware campaign pushes an adware component to all infected devices that aggressively displays advertisements on the device’s home screen, as pop-up windows or full-screen ads to generate fraudulent ad-revenues."
---
If you have one of the affected devices, here's how I checked mine:
1. Install ADB (Windows: https://forum.xda-developers.com/sh...)
2. Connect your device in USB-debugging mode
3. execute "adb shell 'pm list packages -f' > output.txt" (On windows navigate to C:\adb and replace "adb" with ".\adb.exe")
4. open the now created output.txt
5. search for any of those:
com.android.yellowcalendarz (每日黄历)
com.changmi.launcher (畅米桌面)
com.android.services.securewifi (系统WIFI服务)
com.system.service.zdsgt19 -
So I guess you could say Dyn users got Dynied service when their servers were ddossed...
Badum tiss...4 -
Every year my team runs an award ceremony during which people win “awards” for mistakes throughout the year. This years was quite good.
The integration partner award- one of our sysAdmins was talking with a partner from another company over Skype and was having some issues with azure. He intended to send me a small rant but instead sent “fucking azure can go fuck itself, won’t let me update to managed disks from a vhd built on unmanaged” to our jv partner.
Sysadmin wannabe award (mine)- ran “Sudo chmod -R 700 /“ on one of our dev systems then had to spend the next day trying to fix it 😓
The ain’t no sanity clause award - someone ran a massive update query on a prod database without a where clause
The dba wannabe award - one of our support guys was clearing out a prod dB server to make some disk space and accidentally deleted one of the databases devices bringing it down.
The open source community award - one of the devs had been messing about with an apache proxy on a prod web server and it ended up as part of a botnet
There were others but I can’t remember them all4 -
WHAT THE FUCK? WHAT THE FUCK IS THIS SHIT? ARE YOU FUCKING SERIOUS.. I WAKE UP IN THE MIDDLE OF THE FUCKING NIGHT BECAUSE MY FUCKING PHONE VIBRATED UNDER MY FUCKING PILLOW WHICH I KNOW ISN'T VERY HEALTHY BUT WHATEVER, I CHECK MY PHONE AND IT'S A GODDAMN GOOGLE PLAY AD... IN THE FUCKING NOTIFICATIONS. THEY FUCKING SENT ME AN APP SUGGESTION IN MY NOTIFICATIONS EVEN THOUGH THAT OPTION IS SPECIFICALLY TURNED OFF IN THE FUCKING SETTINGS.
FUCK YOU GOOGLE YOU BOTNET GREEDY BLOATED "muh AI" PIECE OF SHIT. I HOPE YOUR SERVERS IN ALL CONTINENTS GET BURNED DOWN BY SOME SADIST NIHILIST HACKER WITH A 0DAY AND YOU SEIZE TO EXIST.
Goodnight.10 -
//little Story of a sys admin
Wondered why a Server on my Linux Root couldn't build a network connection, even when it was running.
Checked iptables and saw, that the port of the Server was redirected to a different port.
I never added that rule to the firewall. Checked and a little script I used from someone else generated traffic for a mobile game.
OK beginn the DDoS Penetration. Over 10 Gbit/s on some small servers.
Checked Facebook and some idiot posted on my site:
Stop you little shithead or I will report you to the police!!!
Checked his profile page and he had a small shitty android game with a botnet.
Choose one:
1. let him be
2. Fuck him up for good
Lets Sudo with 2.
I scaled up my bandwith to 25 Gbit/s and found out that guys phone number.
Slowly started to eat away his bandwith for days. 3 days later his server was unreachable.
Then I masked my VoIP adress and called him:
Me: Hi, you know me?
He: No WTF! Why are you calling me.
Me: I love your're game a lot, I really love it.
He: What's wrong with you? Who are you?
Me: I'm teach
He: teach?
Me: Teach me lesson
He: Are you crazy I'm hanging up!
Me: I really love you're game. I even took away all your bandwith. Now you're servers are blocked, you're game banned on the store.
He: WHAT, WHAT? (hearing typing)
Me: Don't fuck with the wrong guys. I teached you a lesson, call me EL PENETRATO
He: FUCK Fuck Fuck you! Who are you???!!! I'm going to report you!
Me: How?
He: I got you're logs!
Me: Check it at Utrace...
He: Holy shit all around the world
Me: Lemme Smash Bitch
*hung up*4 -
We just got into a malicious bots database with root access.
So guard duty gave us some warnings for our tableau server, after investigating we found an ip that was spamming us trying all sorts. After trying some stuff we managed to access their MySQL database, root root logged us in. Anyway the database we just broke into seems to have schemas for not only the bot but also a few Chinese gambling websites. There are lots of payment details on here.
Big question, who do we report this to, and what's the best way to do so anonymously? I'm assuming the malicious bot has just hyjacked the server for these gambling sites so we won't touch those but dropping the schema the bot is using is also viable. However it has a list of other ips, trying those we found more compromised servers which we could also log in to with root root.
This is kinda ongoing, writing this as my coworker is digging through this more.11 -
Windows you dense motherfucker! Now you come with two different fucking candy crush games and some fucking disney piece of shit botnet useless game consuming an entire GB of precious ssd space?? What the flying fuck i swear i hate this piece of junk more and more every day.
Furthermore, i got my motherboard replaced the other day since it suddenly died and now i cant boot into linux anymore since windows decided it's the only os to live on my laptop? Fuck off3 -
Well then, looks like my pihole attracted the attention of a botnet with 65 zombies attempting a large DNS amplification attack.
Time to unleash the BANHAMMER
Fun fact: only a few hundereds of their requests actually show up in the pihole logs. The other 40k+ requests they attempted were blocked by my firewall :D14 -
Unnamed hacking game - "terminal" graphics
-Multiplayer. Last man standing.
-Like a tower-defence game but technical
You work for a company that has outsourced their technical department to Bykazistan, a country with good internet and bad laws. On one hand, labor is very cheap! There are no pesky laws protecting workers, so you don't need to pay them what they're worth. Phew. However, there are also no laws against cyber crime. But for a start-up like you, the risk is worth the reward!
...which would be great! If you were the only company with that idea. As it turns out, you aren't. All of your competitors also recently outsourced to Bykazistan, and that could be an issue.
You would be afraid, but you are a hardened businessman. You are familiar with the cut-throat nature of the business world and where others see risk, you see opportunity. Let the games begin.
Your mission is to protect your ciritical assets at all costs, eliminate your opponents, and make ciritical financial decisions - all while maintaining your uptime!
Build a botnet and attack your competition to decrease their uptime and disable their attacks. Port scan your opponents to learn more about their network, but beware of honeypots! Initiate devastating social engineering attacks - and train your employees against them! Brute-force their credentials, and strengthen your own.
Make sure to keep your software patched...5 -
Hey! Heard you like scams.
Seriously, what even is this? I heard about this, but didn't think it would happen to me.
Also based on what they want to be doing with another person's computer can also double as a botnet too.14 -
A site I manage in my spare time with a couple thousand normal users was getting attacked by a Chinese botnet. All the requests were coming from only two subnets. Easy to block. Feels like this was only the vanguard. Prelude to the real attack. I'm thinking about moving the site to its own server, so it won't affect my other sites. There at least if it gets kneeled, it'll only be that site.6
-
GIRLS PRANK
Omg I changed her lipstick with one of a slightly different color I'm so random she'll go CrAaAaAzY
BOYS PRANK
Use Tampermonkey to transform your colleague's pc into a chinese botnet and redirect him to some PCC website on every click forever
Yeah long story short that's how my previous firm blocked access to domains hosted by the Chinese government.2 -
chrome
>botnet
firefox
>cucknet
safari
>too much faggotry, doesnt play webms
edge
>too edgy for me, not multi platform
vivaldi
>whats the point runing a skin on top of chrome
brave
>same as vivaldi, also I can install my fucking adblock myself
Any suggestions for other browsers27 -
These are my stickers, there are many like it, but these are mine!
@dfox thank you for the stickers 👍
Happy Ranting!1 -
I wrote some simple pen test scripts that automatically get executed on every ip in my fail2ban log.
Ip count: 2500+ in a few days. Probably victims of botnet. Some have mysql, postgres, smb open and many of them support user/pass auth on their ssh.
The scripts were a lot of fun to write but I don't expect much results.5 -
Holy shit! so after my last news report https://devrant.com/rants/1063342/... , I also shared the news in my site where there is a guy that works in a Washington ISP and also offer mail servers and such for the locals... fun and joke time has ended my friends, any SysAdmins here regarding this want to comment on this topic?9
-
I was getting bored with programing cause a majority of it is boilerplate code then i heard of the Mirai virus. It infected alot of iot devices so I decided to look at it and it was written in golang. It is a beautifully written botnet even though they're parts where it could have been better. So i looked more into golang and saw that it could cross compile pretty easily and could build self contained binaries really easily. On top of all this i saw the smallest docker containers with golang programs so i looked into it more and kept finding more and more that i liked. Easy library packaging, concurancy without boilerplate, quick servers, and the libraries from other devs that did all kind of great things3
-
Sporadic news, now that I have a decent chunk:
AMD's stock price closes higher than Intel's (https://marketwatch.com/story/...)
a Mega Man live-action film is in the works (https://rockman-corner.com/2020/07/...)
T-Mobile will require all devices to have LTE (https://androidpolice.com/2020/07/...)
Patch any ASUS routers you have (https://nakedsecurity.sophos.com/20...)
Emotet is being fucked with (https://zdnet.com/article/...)
Garmin devices are being fucked (https://cnn.com/cnn/2020/...)
Bitcoin is now officially a currency (https://news.bloomberglaw.com/us-la...)
Sonic Movie 2 is comig in 2022 (https://cbr.com/sonic-the-hedgehog-...)
ARM may be totally controlled by Nvidia soon (https://arstechnica.com/gadgets/...)
and the Republican Party is trying to ban the Democrats (either the name or wholly) because racism. (https://foxnews.com/politics/...)3 -
Thoughts after a security conference.
The private sector, no matter the size, often plays a role (e.g. entry vector, DDoS load generating botnet, etc.) in massive, sometimes country-wide attacks. Shouldn't that make private businesses' CyberSec a matter of national security? Shouldn't the government create and enforce a security framework for private businesses to implement in their IT systems? IMO that'd also enforce standardised data security and force all the companies treat ITSec with at least minimal care (where "minimal" is set by the gov)
What are your thoughts?10 -
I just saw this video on slow loris attacks (https://youtu.be/XiFkyR35v2Y).
So my question is: why even bother with creating a botnet for a ddos attack?3 -
!rant; question = true;
Switched to non-google for every device I own, however:
When I accidently go to Google and try to search, it tells me that I am blocked for suspicious activity and need to solve a captcha - If I do, the current search works.. Shortly after tho, it gives me the same thing again.
Any idea how to get more detailed info about the issue, e.g. Ensure none of my systems is quietly participating in a botnet?
PS: why should I care? Just don't use Google! That's right, yes, it still bugs me tho7