gAtO fOuNd - this –// it’s crook selling to crooks take it at face value -/ but it does have some interesting ideas on what is out there in criminals hands and what is going on in the dark web. Now these are 10,000 yes 10k botnets can work in the clearWeb as well as Tor and i2p anonymized networks should cause some concern because normally we don’t monitor them. Tor Domain-flux for both clearWeb and Tor – ( Tor Domain-flux- this is so easy to do but it’s a big feature) – VPN then Tor that will make this harder to find the botMaster. But the coolest feature is the i2p connection. Sorry boy’s and Ladies but Tor is getting old, i2p is beginning to glow and it’s a little different but very safe. It goes after (scanning) WiFi and GPS tracking – So people sync your phone data to your computers data please…C&C and // one- BULLET proof server collector -
It not very hard to do this but – C&C and // one- BULLET proof server collector – is the sales pitch anyway I have obfuscated some links and names -find it your self – I know gAtO can build this so anyone can with some light reading – that comes out to .80 cents per bot for 10,000 bots -0ne c&c panel for $8,000 bucks – pretty cheap – oh yeah the readme comes in english too.
This modified Dark Heart bots and c&c in Tor ?12p ? 256-EAS encryption- We already have reports of it by different names but this was posted around Aug 7 2012. Here is the –/ poor mans –Tor Domain-flux is so easy when you generate a hidden service it produces a key for your address in Tor onion land / just move the key to another directory and generate your new net key and so on and so on… Some of this is really well though out —/ but I don’t trust anyone and it’s so easy to build from scratch- gAtO oUt
—— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ———
Dark Heart botnet— NOT – for sale $8000
Run on windows clients – I need 3 C&C server IP addresses to hardcode and obfuscate
bot coded in assembly no dependencies
Each build has maximum of 10k bots to ovoid widespread av detection.
Basic bot uses socks5.
built in ssh client
Bot is built with 30k pre generated 256 bit AES keys.
1 256 bit AES key for logs
1 256 bit AES key ssh
1 256 bit AES key socks 5
hwid it selects a pre-generated key 256 bit AES key.
Bot writes encrypted data into common file using stenography process injection
Bot sends data to a collector bot via socks5 through ipv6 which makes NAT traversal a trivial matter.
Using ipv6 in ipv4 tunnel.
Collector bot assembly /tor and i2p Plug-ins C++ /Assuming 10k bots
Bots will be assigned into small groups of 25. And are assigned 400 collectors bots which is evenly 200 tor and 200 i2p.
Collector packages the encrypted logs and imports them into a .zip or rar archive and uses sftp to upload through tor to a bullet proof server Note the Ukraine is best know.
(Domain-flux .onion panel can be easily moved)
Using a Ubuntu Server on bullet proof server. / Using tor and Privoxy. Panel can be routed through multiple cracked computers using proxychains and ssh. / Server uses a simple .onion panel with php5 and apache2 and mysql. You might ask what happens if bullet proof server is down. The collector bots can be loaded with 5 .onion panels. If panel fails for 24 hours its removed from all Collectors and bot will go to the next one and so forth. A python Daemon runs and unzip the data and Imports it into a mysql database were it remains encrypted.
The bot master uses my Dark Umbrella.net panel to connect to the remote Bullet Proof server through a vpn and then through tor using ssh to run remote commands on server and sftp to upload and download. Running tor through a log less vpn through with a trusted exit node on the tor network. .net panel connects to mysql database database is decrypted on .NET panel (Note must real Bullet Proof hosting is not trust worthy this solves that issue) and imported into a local .mdb database. Then later the bot Master should encrypt database folder on true crypt. Commands are sent to bots individually rather then corporately like most bot nets. This allows for greater anonymity It will be possible to send commands corporately but strongly discouraged. Collector bots download and upload large files through i2p.
1.Connects remotely to rpc daemon through backconect and simplifying metasploit (Working)
2.Social network cracker. (Beta)
4.Anonymity status. (Working)
5.Decrypt-er. Decryption codes in highly obfuscated.net limiting each build to 10k bots. (Working)
6.Daemon status (Working)
8.Metasploit connects via rpc. (working)
9. GPS tracked Assets by Google maps and using net-book with a high powered external usb wifi attenas.
Starts an automatic attack if wep if wpa2 grabes handshake. If open starts basic arp spoofing attack. Common browser exploits. (alpha)
10.Teensy spread. (in development)
11.vnc back connect. (working)
12. Advanced Persistent threat. Fake Firefox, Fake Internet Explorer, Fake Chrome. Fake Windows Security Essentials. (in development allows for excellent custom Bot-master defined keyloging)
13. Dark search bot index file is downloaded allowing easy searching of hard drives. (Working)
14. voip logic bomb. bot computer is sent via a voip call file once played through voip the microphone hears mp3 file and the dormant payload is activated in bot that is the logic bomb. (Extra- Alpha)
Each Panel is hwid
1 unique build per Copy embedded into panel.
Everything is provided in English only manuals for setup: you need 3 servers for C&C and // one- BULLET proof server collector for -/ everything is working and can be setup within hours: Only serious players - for sale $8000 -bitcoin – (obfuscated )1A9nBLgdhf4NJadXiBppqqU96AhbMBQrgV -
—— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ————— – EDUCATIONAL – ONLY – ———