opennms
Closed Thread
Page 3 of 3 FirstFirst 123
Results 31 to 41 of 41

Thread: Creating a BotNet

  1. #31
    Join Date
    Mar 2008
    Posts
    21
    WAMP is offline :S how do I get it online.

  2. #32
    Join Date
    Sep 2006
    Posts
    1,651
    No, go to the directory that Tsunami is in. There should be a control panel of some sort. I think you might've already logged in.

    Is your WAMP server online? Do you have an index page in the main directory?
    "Workers of the world unite; you have nothing to lose but your chains." -Karl Marx

  3. #33
    Join Date
    Mar 2008
    Posts
    21
    [url]http://tinypic.com/view.php?pic=*6s*6w&s=*[/url]

    That's what [url]http://localhost/[/url] is


    and in my taskbar, when I highlight WAMPSERVER it says "WAMPSERVER - server Offline"


    Lemme ask you, do TsunamiOverHost.exe and server.exe have to be in a certain place? They are nowhere near c:\wamp\... in fact they are on d:\ lol

  4. #34
    Join Date
    Sep 2006
    Posts
    1,651
    I think you have to right-click the taskbar icon and put it online.

    All your files are in the wwwroot folder right? So go to [url]http://localhost/WHATEVERDIRECTORYTSUNAMIISIN[/url] and post a screenshot.
    "Workers of the world unite; you have nothing to lose but your chains." -Karl Marx

  5. #35
    Join Date
    Mar 2008
    Posts
    21
    okay, [url]http://localhost/Xylophone:[/url]


    [url]http://tinypic.com/view.php?pic=2z57ib*&s=*[/url]


    and in c:\wamp\www\Xylophone:

    index.php
    online.php
    update.php
    update.txt

  6. #36
    Join Date
    Sep 2006
    Posts
    1,651
    Hm.. okay, do you have IRC? If so, come to:

    IRC server
    irc.web******.com

    Channel
    #all-net-tools
    "Workers of the world unite; you have nothing to lose but your chains." -Karl Marx

  7. #37
    Join Date
    Mar 2008
    Posts
    21
    Yep, the WAMP didn't work, me and moon tried.



    I can't run it properly from any FTP either, I'd need a specific name.



    Gotta look around I guess.

  8. #38
    Join Date
    Jul 2009
    Posts
    1
    I have read ENTIRE THREAD.

    After reading the issues that ur facing with the WAMP. I am pretty positive that even if u can get the botnet to work. The part to spread ur virus would be tougher. And if u try to goto learn hexing to make ur virus undetectable i think u'd be in a big mess. As u said in ur first thread, u have patient and willing to learn.

    If you want to learn how to HEX.. then check [URL="http://www.techmafias.com"]THIS WEBSITE [/URL] out. A video tutorials is there under "video tutorials"

  9. #39
    Join Date
    Aug 2009
    Posts
    1
    The only reason botnets are so effective is they are distributed. When they come from all over the place, you have to do a ton of individual blocks. If they are all from the same IP space, ok just black hole China's space and that's it. Wouldn't take a block from very many top level providers and they'd be doing nothing at all.
    Last edited by Moonbat; 08-02-2009 at 10:10 PM. Reason: removed spam links

  10. #40
    Join Date
    Aug 2009
    Posts
    3
    People do this for many reasons.Maybe to tell others look I can hack your site or they want to take info, such as license keys from Kaspersky's site (which one romanian hacker succeeded with ease i heard).But some just do it to prove that they can do it, or because they are angry and want revenge.This subject can be largely discussed but you can never know for sure.
    Last edited by gordo; 08-16-2009 at 11:39 AM.

  11. #41
    lopez124 Guest
    A typical example is a web server log which maintains a history of page requests. The W*C maintains a standard format for web server log files, but other proprietary formats exist. More recent entries are typically appended to the end of the file. Information about the request,[URL="http://www.certpaper.com/642-*64.htm"]642-*64[/URL] including client IP address, request date/time, page requested, HTTP code, bytes served, user agent, and referer are typically added. These data can be combined into a single file, or separated into distinct logs, such as an access log, error log, or referer log. However, server logs typically do not collect user-specific information.These files are usually not accessible to general Internet users,[URL="http://www.certpaper.com/642-566.htm"]642-566[/URL] only to the web****** or other administrative person. A statistical analysis of the server log may be used to examine traffic patterns by time of day, day of week, referrer, or user agent. Efficient web site administration, adequate hosting resources and the fine tuning of sales efforts can be aided by analysis of the web server logs.[URL="http://www.certpaper.com/*Y0-456.htm"]*Y0-456[/URL] Marketing departments of any organization that owns a website should be trained to understand these powerful tools.

Closed Thread

Similar Threads

  1. creating my own Keylogger?
    By Tenz in forum Programming
    Replies: 1
    Last Post: 09-05-2007, 05:38 PM
  2. Makeing your own botnet.
    By carlo in forum Internet Privacy
    Replies: 1
    Last Post: 02-17-2006, 01:57 PM
  3. Creating trojans
    By Unregistered in forum Viruses and Trojans
    Replies: 13
    Last Post: 09-04-2005, 04:28 AM
  4. help me here! creating the keylogger!
    By Unregistered in forum Proxies and Firewalls
    Replies: 1
    Last Post: 07-16-2005, 07:08 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts