Difference between revisions of "Features"

From Botnets.fr
Jump to navigation Jump to search
Line 1: Line 1:
{{#ask:[[Category:Features]]|?feature category|limit=10000}}
{{#ask:[[Category:Features]]|?feature category|limit=10000|sort=feature category}}

Revision as of 13:43, 8 August 2015

 Feature category
Open website in browserAnnoyance
Pop-upAnnoyance
Disable network adaptersAnnoyance
Encrypt without C&C connectionAnnoyance
Erase filesAnnoyance
Lock systemAnnoyance
Encrypt filesAnnoyance
MBR overwriteAnnoyance
Decryption of locked filesAnnoyance
Encrypt MFTAnnoyance
Display pop-up messageAnnoyance
Launch delayArmor
Removal of competing malwareArmor
Register as print processorArmor
String stackingArmor
Anti-virus uninstallArmor
Monitor mouse eventsArmor
Store data in ADSArmor
DNS blocking of AV companiesArmor
Check CPU name in registryArmor
Virtual machine detectionArmor
Server-side polymorphismArmor
Debugging detectionArmor
Anti-virus blockingArmor
Hidden file storageArmor
PolymorphismArmor
Video screen captureAudio visual
Camera captureAudio visual
Microphone captureAudio visual
Screen captureAudio visual
BackdoorBackdoors
VNC serverBackdoors
Backconnect serverBackdoors
NetcatBackdoors
Mozilla browser extensionBrowser extensions
AffiliationCommercial model
KitCommercial model
ExchangeCriminal services
Anti-virus checkingCriminal services
Bullet-proof hostingCriminal services
CardingCriminal services
ForumCriminal services
Credit card checkingCriminal services
Pay-per-installCriminal services
Traffic distribution serviceCriminal services
TDSCriminal services
Double fastfluxDNS and URL features
Dynamic DNSDNS and URL features
Handle generation algorithmDNS and URL features
Fast fluxDNS and URL features
Domain generation algorithmDNS and URL features
Data theftData theft
Firefox password theftData theft
Browser password theftData theft
Friendster password theftData theft
Chrome browser extensionData theft
POP3 password theftData theft
FTP client password theftData theft
JDownloader password theftData theft
Sendspace password theftData theft
Windows products ID theftData theft
Paypal password theftData theft
Memory scrappingData theft
Vkontakte password theftData theft
Password theftData theft
FTP password theftData theft
Email password theftData theft
Email harvestingData theft
VNC password theftData theft
HTTP password theftData theft
Software ID theftData theft
Certificate theftData theft
FileZilla password theftData theft
Mozilla Sqlite data theftData theft
Facebook password theftData theft
Contact theftData theft
Netflix password theftData theft
Document theftData theft
Bitcoin wallet theftData theft
Firefox cookie theftData theft
Banking credential theftData theft
File theftData theft
Outlook password theftData theft
Web password theftData theft
Twitter password theftData theft
WoW password theftData theft
Browse file systemsData theft
Mail client password theftData theft
Cookie theftData theft
Pidgin password theftData theft
Bebo password theftData theft
Internet Explorer password theftData theft
Form data theftData theft
IM password theftData theft
AOL password theftData theft
Credit card data theftData theft
Regular expression filteringData validation
Luhn algorithm checkData validation
UDP floodDenial of service
DDoSDenial of service
Slow POSTDenial of service
Bandwidth floodDenial of service
Layer 7 attackDenial of service
BooterDenial of service
GET floodDenial of service
HTTP floodDenial of service
POST floodDenial of service
SlowlorisDenial of service
GRE floodDenial of service
SYN floodDenial of service
TCP floodDenial of service
ApacheKillerDenial of service
Right-to-left overrideDistribution vector
RDP vectorDistribution vector
MSN vectorDistribution vector
Brute-forceDistribution vector
Shared drive vectorDistribution vector
USB vectorDistribution vector
SQL InjectionDistribution vector
Skype vectorDistribution vector
Torrent vectorDistribution vector
WormDistribution vector
YIM vectorDistribution vector
Facebook vectorDistribution vector
Removable drive vectorDistribution vector
Social network vectorDistribution vector
Email wormDistribution vector
Data compressionEncoding
XOR encodingEncoding
JPEG encodingEncoding
Base64 encodingEncoding
Elliptic curve encryptionEncryption
AES encryptionEncryption
Custom C&C encryption algorithmEncryption
SteganographyEncryption
Diffie-HellmanEncryption
Custom XOR-based encryptionEncryption
Custom encryption algorithmEncryption
Twofish encryptionEncryption
Encryption of captured dataEncryption
RC4 encryptionEncryption
.cerberFile extension
.lukitusFile extension
WebinjectInjections
Javascript injectionInjections
Automated transfer system (ATS)Injections
Man in the browserInjections
Java Signed Applet Social Engineering Code ExecutionInjections
Dynamic webinject configuration updateInjections
Voice-over-IP surveillanceInterception
KeyloggerInterception
SPDY grabbingInterception
Winpcap interceptionInterception
Email surveillanceInterception
IM surveillanceInterception
Network sniffingInterception
SMS interceptionInterception
Skype surveillanceInterception
MTAN interceptionInterception
GeolocalisationMaintenance
UninstallMaintenance
LoggingMaintenance
Upload minidumpMaintenance
Network information gatheringMaintenance
Phone homeMaintenance
System information gatheringMaintenance
Port scanningMaintenance
UpdateMaintenance
DebuggingMaintenance
SMS paymentMonetization
Bitcoin paymentMonetization
Premium callsMonetization
Premium servicesMonetization
MoneXy paymentMonetization
Premium SMSMonetization
Display advertising pop-upsMonetization
VMProtectObfuscators
UPX ProtectorPackers
ThemidaPackers
Custom packerPackers
TELockPackers
EnigmaPackers
UPX PackingPackers
ArmadilloPackers
Visual Basic crypterPackers
Cross-infectionPotency
SOCKSProxy
HTTP proxyProxy
SOCKS5Proxy
ProxyProxy
Remote controlRemote control
Command shellRemote control
File executeRemote control
File uploadRemote control
Run commandsRemote control
Kill system processesRemote control
File downloadRemote control
Query system processesRemote control
CAPTCHA display to solveResource exploitation
Click fraudResource exploitation
Bitcoin miningResource exploitation
Web serverResource exploitation
MBR installationRootkit
BIOS installationRootkit
RootkitRootkit
BootkitRootkit
Send spamSpam
Gmail spamSpam
SMS spamSpam
Produce spam from templatesSpam
PhishingSpam
PharmingTraffic hijacking techniques
Startpage modificationTraffic hijacking techniques
Hosts modificationTraffic hijacking techniques
DNS configuration modificationTraffic hijacking techniques
Search results manipulationTraffic hijacking techniques
URL redirectionTraffic hijacking techniques
DNS hijackTraffic hijacking techniques
MailslotTunnel
Component Object Model (COM)Tunnel