Difference between revisions of "Features"

From Botnets.fr
Jump to navigation Jump to search
Line 1: Line 1:
{{#ask:[[Category:Features]]|?feature category|limit=10000}}
{{#ask:[[Category:Features]]|?feature category|limit=10000|sort=feature category}}

Revision as of 13:43, 8 August 2015

 Feature category
Disable network adaptersAnnoyance
Open website in browserAnnoyance
Encrypt without C&C connectionAnnoyance
Lock systemAnnoyance
Erase filesAnnoyance
MBR overwriteAnnoyance
Encrypt MFTAnnoyance
Encrypt filesAnnoyance
Decryption of locked filesAnnoyance
Pop-upAnnoyance
Display pop-up messageAnnoyance
Store data in ADSArmor
Virtual machine detectionArmor
Check CPU name in registryArmor
Server-side polymorphismArmor
DNS blocking of AV companiesArmor
Hidden file storageArmor
PolymorphismArmor
Debugging detectionArmor
Anti-virus blockingArmor
Launch delayArmor
Removal of competing malwareArmor
Register as print processorArmor
Anti-virus uninstallArmor
String stackingArmor
Monitor mouse eventsArmor
Video screen captureAudio visual
Screen captureAudio visual
Camera captureAudio visual
Microphone captureAudio visual
VNC serverBackdoors
BackdoorBackdoors
Backconnect serverBackdoors
NetcatBackdoors
Mozilla browser extensionBrowser extensions
AffiliationCommercial model
KitCommercial model
ExchangeCriminal services
Anti-virus checkingCriminal services
Bullet-proof hostingCriminal services
CardingCriminal services
ForumCriminal services
Credit card checkingCriminal services
Traffic distribution serviceCriminal services
Pay-per-installCriminal services
TDSCriminal services
Dynamic DNSDNS and URL features
Handle generation algorithmDNS and URL features
Fast fluxDNS and URL features
Domain generation algorithmDNS and URL features
Double fastfluxDNS and URL features
Data theftData theft
Firefox password theftData theft
Password theftData theft
Browser password theftData theft
HTTP password theftData theft
Friendster password theftData theft
Chrome browser extensionData theft
FTP client password theftData theft
Memory scrappingData theft
Netflix password theftData theft
Vkontakte password theftData theft
Windows products ID theftData theft
Web password theftData theft
FTP password theftData theft
Firefox cookie theftData theft
Twitter password theftData theft
Email harvestingData theft
VNC password theftData theft
Software ID theftData theft
Email password theftData theft
FileZilla password theftData theft
Certificate theftData theft
Mozilla Sqlite data theftData theft
Facebook password theftData theft
Mail client password theftData theft
Pidgin password theftData theft
Contact theftData theft
Bitcoin wallet theftData theft
Document theftData theft
Banking credential theftData theft
File theftData theft
Outlook password theftData theft
WoW password theftData theft
Browse file systemsData theft
JDownloader password theftData theft
Bebo password theftData theft
POP3 password theftData theft
Internet Explorer password theftData theft
Cookie theftData theft
Sendspace password theftData theft
Form data theftData theft
IM password theftData theft
Paypal password theftData theft
AOL password theftData theft
Credit card data theftData theft
Luhn algorithm checkData validation
Regular expression filteringData validation
Layer 7 attackDenial of service
UDP floodDenial of service
DDoSDenial of service
Slow POSTDenial of service
Bandwidth floodDenial of service
SlowlorisDenial of service
BooterDenial of service
GET floodDenial of service
GRE floodDenial of service
HTTP floodDenial of service
POST floodDenial of service
SYN floodDenial of service
TCP floodDenial of service
ApacheKillerDenial of service
Shared drive vectorDistribution vector
MSN vectorDistribution vector
SQL InjectionDistribution vector
Skype vectorDistribution vector
WormDistribution vector
Brute-forceDistribution vector
USB vectorDistribution vector
Facebook vectorDistribution vector
Torrent vectorDistribution vector
Removable drive vectorDistribution vector
Social network vectorDistribution vector
RDP vectorDistribution vector
Right-to-left overrideDistribution vector
YIM vectorDistribution vector
Email wormDistribution vector
Data compressionEncoding
JPEG encodingEncoding
XOR encodingEncoding
Base64 encodingEncoding
Custom encryption algorithmEncryption
Elliptic curve encryptionEncryption
AES encryptionEncryption
Custom C&C encryption algorithmEncryption
Twofish encryptionEncryption
Custom XOR-based encryptionEncryption
SteganographyEncryption
Encryption of captured dataEncryption
Diffie-HellmanEncryption
RC4 encryptionEncryption
.cerberFile extension
.lukitusFile extension
Java Signed Applet Social Engineering Code ExecutionInjections
Automated transfer system (ATS)Injections
Dynamic webinject configuration updateInjections
WebinjectInjections
Javascript injectionInjections
Man in the browserInjections
IM surveillanceInterception
SPDY grabbingInterception
Network sniffingInterception
SMS interceptionInterception
Winpcap interceptionInterception
Email surveillanceInterception
Skype surveillanceInterception
MTAN interceptionInterception
Voice-over-IP surveillanceInterception
KeyloggerInterception
GeolocalisationMaintenance
Phone homeMaintenance
LoggingMaintenance
Port scanningMaintenance
Network information gatheringMaintenance
System information gatheringMaintenance
UninstallMaintenance
UpdateMaintenance
DebuggingMaintenance
Upload minidumpMaintenance
SMS paymentMonetization
Premium callsMonetization
Premium servicesMonetization
Premium SMSMonetization
Bitcoin paymentMonetization
MoneXy paymentMonetization
Display advertising pop-upsMonetization
VMProtectObfuscators
UPX ProtectorPackers
ThemidaPackers
Custom packerPackers
ArmadilloPackers
EnigmaPackers
TELockPackers
UPX PackingPackers
Visual Basic crypterPackers
Cross-infectionPotency
SOCKSProxy
SOCKS5Proxy
ProxyProxy
HTTP proxyProxy
Command shellRemote control
File executeRemote control
Kill system processesRemote control
File downloadRemote control
Remote controlRemote control
Query system processesRemote control
File uploadRemote control
Run commandsRemote control
CAPTCHA display to solveResource exploitation
Web serverResource exploitation
Click fraudResource exploitation
Bitcoin miningResource exploitation
MBR installationRootkit
RootkitRootkit
BIOS installationRootkit
BootkitRootkit
SMS spamSpam
Produce spam from templatesSpam
Gmail spamSpam
PhishingSpam
Send spamSpam
Startpage modificationTraffic hijacking techniques
Hosts modificationTraffic hijacking techniques
DNS configuration modificationTraffic hijacking techniques
Search results manipulationTraffic hijacking techniques
URL redirectionTraffic hijacking techniques
DNS hijackTraffic hijacking techniques
PharmingTraffic hijacking techniques
Component Object Model (COM)Tunnel
MailslotTunnel