Difference between revisions of "Features"

From Botnets.fr
Jump to navigation Jump to search
Line 1: Line 1:
{{#ask:[[Category:Features]]|?feature category|limit=10000}}
{{#ask:[[Category:Features]]|?feature category|limit=10000|sort=feature category}}

Revision as of 13:43, 8 August 2015

 Feature category
Lock systemAnnoyance
Erase filesAnnoyance
Encrypt filesAnnoyance
MBR overwriteAnnoyance
Decryption of locked filesAnnoyance
Encrypt MFTAnnoyance
Display pop-up messageAnnoyance
Open website in browserAnnoyance
Pop-upAnnoyance
Disable network adaptersAnnoyance
Encrypt without C&C connectionAnnoyance
Hidden file storageArmor
Debugging detectionArmor
Anti-virus blockingArmor
PolymorphismArmor
Launch delayArmor
Removal of competing malwareArmor
Register as print processorArmor
Anti-virus uninstallArmor
String stackingArmor
Monitor mouse eventsArmor
DNS blocking of AV companiesArmor
Store data in ADSArmor
Virtual machine detectionArmor
Check CPU name in registryArmor
Server-side polymorphismArmor
Microphone captureAudio visual
Screen captureAudio visual
Video screen captureAudio visual
Camera captureAudio visual
NetcatBackdoors
BackdoorBackdoors
VNC serverBackdoors
Backconnect serverBackdoors
Mozilla browser extensionBrowser extensions
AffiliationCommercial model
KitCommercial model
Credit card checkingCriminal services
Pay-per-installCriminal services
Traffic distribution serviceCriminal services
TDSCriminal services
ExchangeCriminal services
Anti-virus checkingCriminal services
Bullet-proof hostingCriminal services
CardingCriminal services
ForumCriminal services
Handle generation algorithmDNS and URL features
Fast fluxDNS and URL features
Domain generation algorithmDNS and URL features
Double fastfluxDNS and URL features
Dynamic DNSDNS and URL features
Netflix password theftData theft
Document theftData theft
Bitcoin wallet theftData theft
Outlook password theftData theft
Web password theftData theft
Firefox cookie theftData theft
Banking credential theftData theft
File theftData theft
WoW password theftData theft
Twitter password theftData theft
Browse file systemsData theft
Internet Explorer password theftData theft
Mail client password theftData theft
Cookie theftData theft
Pidgin password theftData theft
Bebo password theftData theft
Form data theftData theft
AOL password theftData theft
Credit card data theftData theft
IM password theftData theft
Browser password theftData theft
Data theftData theft
Firefox password theftData theft
Chrome browser extensionData theft
Friendster password theftData theft
JDownloader password theftData theft
POP3 password theftData theft
FTP client password theftData theft
Sendspace password theftData theft
Vkontakte password theftData theft
Windows products ID theftData theft
Paypal password theftData theft
Memory scrappingData theft
Password theftData theft
FTP password theftData theft
VNC password theftData theft
HTTP password theftData theft
Software ID theftData theft
Email password theftData theft
Email harvestingData theft
FileZilla password theftData theft
Certificate theftData theft
Contact theftData theft
Mozilla Sqlite data theftData theft
Facebook password theftData theft
Regular expression filteringData validation
Luhn algorithm checkData validation
HTTP floodDenial of service
POST floodDenial of service
SlowlorisDenial of service
GRE floodDenial of service
SYN floodDenial of service
TCP floodDenial of service
ApacheKillerDenial of service
UDP floodDenial of service
DDoSDenial of service
Slow POSTDenial of service
Bandwidth floodDenial of service
Layer 7 attackDenial of service
BooterDenial of service
GET floodDenial of service
Skype vectorDistribution vector
Torrent vectorDistribution vector
WormDistribution vector
YIM vectorDistribution vector
Facebook vectorDistribution vector
Removable drive vectorDistribution vector
Social network vectorDistribution vector
Email wormDistribution vector
RDP vectorDistribution vector
Right-to-left overrideDistribution vector
MSN vectorDistribution vector
Brute-forceDistribution vector
Shared drive vectorDistribution vector
USB vectorDistribution vector
SQL InjectionDistribution vector
Base64 encodingEncoding
Data compressionEncoding
XOR encodingEncoding
JPEG encodingEncoding
Twofish encryptionEncryption
Encryption of captured dataEncryption
RC4 encryptionEncryption
AES encryptionEncryption
Custom C&C encryption algorithmEncryption
Elliptic curve encryptionEncryption
SteganographyEncryption
Diffie-HellmanEncryption
Custom XOR-based encryptionEncryption
Custom encryption algorithmEncryption
.cerberFile extension
.lukitusFile extension
Dynamic webinject configuration updateInjections
WebinjectInjections
Javascript injectionInjections
Automated transfer system (ATS)Injections
Man in the browserInjections
Java Signed Applet Social Engineering Code ExecutionInjections
IM surveillanceInterception
Email surveillanceInterception
Network sniffingInterception
SMS interceptionInterception
Skype surveillanceInterception
MTAN interceptionInterception
Voice-over-IP surveillanceInterception
KeyloggerInterception
SPDY grabbingInterception
Winpcap interceptionInterception
Port scanningMaintenance
UpdateMaintenance
DebuggingMaintenance
GeolocalisationMaintenance
UninstallMaintenance
LoggingMaintenance
Upload minidumpMaintenance
Network information gatheringMaintenance
Phone homeMaintenance
System information gatheringMaintenance
Bitcoin paymentMonetization
Premium callsMonetization
Premium servicesMonetization
MoneXy paymentMonetization
Premium SMSMonetization
Display advertising pop-upsMonetization
SMS paymentMonetization
VMProtectObfuscators
EnigmaPackers
TELockPackers
UPX PackingPackers
ArmadilloPackers
Visual Basic crypterPackers
UPX ProtectorPackers
ThemidaPackers
Custom packerPackers
Cross-infectionPotency
SOCKS5Proxy
HTTP proxyProxy
ProxyProxy
SOCKSProxy
File downloadRemote control
Query system processesRemote control
Remote controlRemote control
Command shellRemote control
File executeRemote control
File uploadRemote control
Run commandsRemote control
Kill system processesRemote control
Click fraudResource exploitation
Bitcoin miningResource exploitation
Web serverResource exploitation
CAPTCHA display to solveResource exploitation
MBR installationRootkit
BIOS installationRootkit
RootkitRootkit
BootkitRootkit
PhishingSpam
Send spamSpam
Gmail spamSpam
SMS spamSpam
Produce spam from templatesSpam
DNS configuration modificationTraffic hijacking techniques
Search results manipulationTraffic hijacking techniques
URL redirectionTraffic hijacking techniques
DNS hijackTraffic hijacking techniques
PharmingTraffic hijacking techniques
Startpage modificationTraffic hijacking techniques
Hosts modificationTraffic hijacking techniques
Component Object Model (COM)Tunnel
MailslotTunnel