Researchers infiltrate denial of service networks

Thursday, 10 April 2003, 11:23 AM EST

As a part of his work for the Honeynet Research Alliance, Bill McCarty, an associate professor of Web and information technology at Azusa Pacific University in Southern California, deployed a series of vulnerable Windows based systems on the Internet. These "honeypots" were compromised by Internet worms and malicious hackers over and over, and led McCarty on a whirlwind tour through a series of sophisticated DDoS networks, one after the other.

"You put up a honeypot and it gets knocked over... again and again and again," he told ZDNet Australia.

Once his honeypot had been compromised, it joined whatís called a botnet, or bot network. These networks are used by malicious hackers to conduct denial of service attacks by issuing single commands to huge numbers of systems through internet relay chat commands.

[ Read more ]




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //