Agobot

http://en.wikipedia.org/wiki/Agobot


Agobot, also frequently known as Gaobot, is a family of computer worms. Axel "Ago" Gembe, a German programmer, was responsible for writing the first version.[1][2][3] The Agobot source code describes it as: “a modular IRC bot for Win32 / Linux”. Agobot was released under version 2 of the GNU General Public License. Agobot is a multi-threaded and mostly object oriented program written in C++ as well as a small amount of assembly. Agobot is an example of a Botnet that requires little or no programming knowledge to use.

Contents

   [hide

Technical details[edit]

New versions, or variants, of the worm appeared so rapidly that the Agobot family quickly grew larger than other bot families. Other bots in the Agobot family are Phatbot and Forbot. Agobot now has several thousand variants. The majority of the development force behind Agobot is targeting the Microsoft Windowsplatform; as a result the vast majority of the variants are not Linux compatible. In fact the majority of modern Agobot strains must be built with Visual Studiodue to its reliance on Visual Studio's SDK and Processor Pack. An infectious Agobot can vary in size from ~500kbyte to ~12kbyte depending on features, compiler optimizations and binary modifications.

A module written for one member in the Agobot family can usually be ported with ease to another bot. This mix-matching of modules to suit the owner's needs has inspired many of the worm's variants.

Most Agobots have the following features:

  • Password Protected IRC Client control interface
  • Remotely update and remove the installed bot
  • Execute programs and commands
  • Port scanner used to find and infect other hosts
  • DDoS attacks used to takedown networks

The Agobot may contain other features such as:

Spreading[edit]

The following propagation methods are sub-modules to the port scanning engine:

Generally, it has been observed that every custom modified variant of Agobot features a selection of the above methods as well as some "homebrew" modules, which essentially are released exploits ported to its code.

Names and such can be added via the XML files to produce variable shuffle imports.

Variants[edit]

Gaobot.ee[edit]

Gaobot.ee is a variant of Agobot. It is also known as the W32.HLLW.Gaobot.EE. It is a malicious computer worm that tends to come from the P2P network Ares, installing from its virus form, Ares.exe. It has rather odd characteristics for a virus, with the unique ability to download and install random files (perhaps to create more sharers) from its members, such as musicpornography, and even full games. Gaobot.ee is a worm that sends large numbers of unsolicited e-mailsusing its own SMTP engine. This worm also opens a backdoor on a random TCP port, notifies attackers through a predetermined IRC channel, and attempts to terminate various security products and system monitoring tools.

Its security level is low, hardly doing any damage to a computer; it has been reported/attributed to, not proven to, however, download and install spyware, more viruses, trojans, and worms.

References[edit]

  1. ^ Infosecurity 2008 Threat Analysis, page 16, ISBN 1-59749-224-8 ISBN 978-1-59749-224-9
  2. ^ http://online.wsj.com/public/article_print/SB116900488955878543-yrMHYlacFyxijV14BxFZfXeU1_8_20070216.html How Legal Codes Can Hinder Hacker Cases
  3. ^ http://wsjclassroom.com/archive/05feb/onln_hacker.htm Hacker Hitmen - Cyber Attacks Used to Be for Thrill Seekers. Now They're About Money.

External links[edit]


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值