Difference between revisions of "Features"

From Botnets.fr
Jump to navigation Jump to search
Line 1: Line 1:
{{#ask:[[Category:Features]]|?feature category|limit=10000}}
{{#ask:[[Category:Features]]|?feature category|limit=10000|sort=feature category}}

Revision as of 13:43, 8 August 2015

 Feature category
Decryption of locked filesAnnoyance
Encrypt MFTAnnoyance
Display pop-up messageAnnoyance
Open website in browserAnnoyance
Pop-upAnnoyance
Disable network adaptersAnnoyance
Encrypt without C&C connectionAnnoyance
Erase filesAnnoyance
Lock systemAnnoyance
Encrypt filesAnnoyance
MBR overwriteAnnoyance
Anti-virus blockingArmor
Hidden file storageArmor
Debugging detectionArmor
PolymorphismArmor
Launch delayArmor
Removal of competing malwareArmor
Register as print processorArmor
Anti-virus uninstallArmor
String stackingArmor
Monitor mouse eventsArmor
Store data in ADSArmor
DNS blocking of AV companiesArmor
Check CPU name in registryArmor
Virtual machine detectionArmor
Server-side polymorphismArmor
Video screen captureAudio visual
Camera captureAudio visual
Microphone captureAudio visual
Screen captureAudio visual
NetcatBackdoors
BackdoorBackdoors
VNC serverBackdoors
Backconnect serverBackdoors
Mozilla browser extensionBrowser extensions
AffiliationCommercial model
KitCommercial model
Traffic distribution serviceCriminal services
Pay-per-installCriminal services
TDSCriminal services
ExchangeCriminal services
Anti-virus checkingCriminal services
Bullet-proof hostingCriminal services
CardingCriminal services
ForumCriminal services
Credit card checkingCriminal services
Fast fluxDNS and URL features
Domain generation algorithmDNS and URL features
Double fastfluxDNS and URL features
Dynamic DNSDNS and URL features
Handle generation algorithmDNS and URL features
Browse file systemsData theft
Pidgin password theftData theft
Bebo password theftData theft
Internet Explorer password theftData theft
Mail client password theftData theft
Cookie theftData theft
Form data theftData theft
AOL password theftData theft
Credit card data theftData theft
IM password theftData theft
Data theftData theft
Firefox password theftData theft
Browser password theftData theft
Friendster password theftData theft
Chrome browser extensionData theft
FTP client password theftData theft
JDownloader password theftData theft
POP3 password theftData theft
Sendspace password theftData theft
Paypal password theftData theft
Memory scrappingData theft
Vkontakte password theftData theft
Windows products ID theftData theft
FTP password theftData theft
Password theftData theft
Email harvestingData theft
VNC password theftData theft
HTTP password theftData theft
Software ID theftData theft
Email password theftData theft
FileZilla password theftData theft
Certificate theftData theft
Facebook password theftData theft
Contact theftData theft
Mozilla Sqlite data theftData theft
Bitcoin wallet theftData theft
Netflix password theftData theft
Document theftData theft
Banking credential theftData theft
File theftData theft
Outlook password theftData theft
Web password theftData theft
Firefox cookie theftData theft
Twitter password theftData theft
WoW password theftData theft
Regular expression filteringData validation
Luhn algorithm checkData validation
SlowlorisDenial of service
GRE floodDenial of service
SYN floodDenial of service
TCP floodDenial of service
ApacheKillerDenial of service
UDP floodDenial of service
DDoSDenial of service
Slow POSTDenial of service
Bandwidth floodDenial of service
Layer 7 attackDenial of service
BooterDenial of service
GET floodDenial of service
HTTP floodDenial of service
POST floodDenial of service
YIM vectorDistribution vector
Facebook vectorDistribution vector
Removable drive vectorDistribution vector
Social network vectorDistribution vector
Email wormDistribution vector
RDP vectorDistribution vector
Right-to-left overrideDistribution vector
MSN vectorDistribution vector
Brute-forceDistribution vector
Shared drive vectorDistribution vector
USB vectorDistribution vector
SQL InjectionDistribution vector
Skype vectorDistribution vector
Torrent vectorDistribution vector
WormDistribution vector
Base64 encodingEncoding
Data compressionEncoding
XOR encodingEncoding
JPEG encodingEncoding
Encryption of captured dataEncryption
RC4 encryptionEncryption
Elliptic curve encryptionEncryption
AES encryptionEncryption
Custom C&C encryption algorithmEncryption
SteganographyEncryption
Diffie-HellmanEncryption
Custom encryption algorithmEncryption
Custom XOR-based encryptionEncryption
Twofish encryptionEncryption
.cerberFile extension
.lukitusFile extension
Dynamic webinject configuration updateInjections
WebinjectInjections
Javascript injectionInjections
Automated transfer system (ATS)Injections
Man in the browserInjections
Java Signed Applet Social Engineering Code ExecutionInjections
Network sniffingInterception
SMS interceptionInterception
Skype surveillanceInterception
MTAN interceptionInterception
Voice-over-IP surveillanceInterception
KeyloggerInterception
SPDY grabbingInterception
Winpcap interceptionInterception
Email surveillanceInterception
IM surveillanceInterception
UpdateMaintenance
DebuggingMaintenance
GeolocalisationMaintenance
UninstallMaintenance
LoggingMaintenance
Upload minidumpMaintenance
Network information gatheringMaintenance
System information gatheringMaintenance
Phone homeMaintenance
Port scanningMaintenance
MoneXy paymentMonetization
Premium SMSMonetization
Display advertising pop-upsMonetization
SMS paymentMonetization
Premium callsMonetization
Premium servicesMonetization
Bitcoin paymentMonetization
VMProtectObfuscators
Visual Basic crypterPackers
UPX ProtectorPackers
ThemidaPackers
Custom packerPackers
EnigmaPackers
TELockPackers
UPX PackingPackers
ArmadilloPackers
Cross-infectionPotency
ProxyProxy
SOCKSProxy
HTTP proxyProxy
SOCKS5Proxy
Query system processesRemote control
Remote controlRemote control
Command shellRemote control
File executeRemote control
File uploadRemote control
Run commandsRemote control
Kill system processesRemote control
File downloadRemote control
Web serverResource exploitation
CAPTCHA display to solveResource exploitation
Click fraudResource exploitation
Bitcoin miningResource exploitation
MBR installationRootkit
BIOS installationRootkit
RootkitRootkit
BootkitRootkit
Send spamSpam
Gmail spamSpam
SMS spamSpam
Produce spam from templatesSpam
PhishingSpam
DNS configuration modificationTraffic hijacking techniques
Search results manipulationTraffic hijacking techniques
URL redirectionTraffic hijacking techniques
DNS hijackTraffic hijacking techniques
PharmingTraffic hijacking techniques
Startpage modificationTraffic hijacking techniques
Hosts modificationTraffic hijacking techniques
MailslotTunnel
Component Object Model (COM)Tunnel