Researchers infiltrate denial of service networks

Thursday, 10 April 2003, 11:23 AM EST

As a part of his work for the Honeynet Research Alliance, Bill McCarty, an associate professor of Web and information technology at Azusa Pacific University in Southern California, deployed a series of vulnerable Windows based systems on the Internet. These "honeypots" were compromised by Internet worms and malicious hackers over and over, and led McCarty on a whirlwind tour through a series of sophisticated DDoS networks, one after the other.

"You put up a honeypot and it gets knocked over... again and again and again," he told ZDNet Australia.

Once his honeypot had been compromised, it joined what’s called a botnet, or bot network. These networks are used by malicious hackers to conduct denial of service attacks by issuing single commands to huge numbers of systems through internet relay chat commands.

[ Read more ]




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //