IRC Bots. Lance Buttars AKA Nemus. Code From This Talk
|
|
- Lesley Gregory
- 8 years ago
- Views:
Transcription
1 IRC Bots Lance Buttars AKA Nemus Code From This Talk
2 Ready Made Bots Phenny - Python Cinch Ruby Egg Drop C,TCl
3 Why Write an IRC Bot? Arduino Bot pyserial Control Real Devices Speaking Bot espeak Say Things Command and Control Bot - bash Run Commands Error Notification Bot sockets / web API Send messages to groups of people
4 NemusBOT! (Sheep) Python Code IRC Components Socket connection Join channel. Check for identity and register. While Loop Message parsing. - Executing commands.
5 UDP Socket Client import socket UDP_IP = " " UDP_PORT = 5005 MESSAGE = "Hello, World!" print "UDP target IP:", UDP_IP print "UDP target port:", UDP_PORT print "message:", MESSAGE sock = socket.socket(socket.af_inet, socket.sock_dgram) sock.sendto(message, (UDP_IP, UDP_PORT))
6 UPD Socket Server import socket UDP_IP = " " UDP_PORT = 5005 sock = socket.socket(socket.af_inet,socket.sock_dgram) sock.bind((udp_ip, UDP_PORT)) while True: data, addr = sock.recvfrom(1024) print "received message:", data
7 TCP Client import socket TCP_IP = ' ' TCP_PORT = 5005 BUFFER_SIZE = 1024 MESSAGE = "Hello, World! s = socket.socket(socket.af_inet, socket.sock_stream) s.connect((tcp_ip, TCP_PORT)) s.send(message) data = s.recv(buffer_size) s.close() print "received data:", data
8 TCP Server #!/usr/bin/env python import socket TCP_IP = ' ' TCP_PORT = 5005 BUFFER_SIZE = 20 # Normally 1024, but we want fast response s = socket.socket(socket.af_inet, socket.sock_stream) s.bind((tcp_ip, TCP_PORT)) s.listen(1) conn, addr = s.accept() print 'Connection address:', addr while 1: data = conn.recv(buffer_size) print "received data:", data conn.send(data) # echo conn.close()
9 Blocking Sockets In Python, you use socket.setblocking(0) to make it nonblocking. When the socket is non blocking it will throw an error when there is no data or the socket is not available to write data. The major mechanical difference is that send, recv, connect and accept can return without having done anything. You have (of course) a number of choices. You can check return code and error codes and generally drive yourself crazy.
10 Python Socket Select ready_to_read, ready_to_write, in_error = \ select.select( potential_readers, potential_writers, potential_errs, timeout) You pass select three lists: the first contains all sockets that you might want to try reading; the second all the sockets you might want to try writing to, and the last (normally left empty) those that you want to check for errors. You should note that a socket can go into more than one list. The select call is blocking, but you can give it a timeout In return, you will get three lists. They contain the sockets that are actually readable, writable and in error. Each of these lists is a subset (possibly empty) of the corresponding list you passed in.
11 Connecting to an IRC SERVER ### CODE ircsock = socket.socket(socket.af_inet, socket.sock_stream) # Here we connect to the server using the port 6667 ircsock.connect(( chat.freenode.net, 6667)) ircsock.send('user '+nicks+' host '+host_name+' : Nemus Brand Bot\r\n') ### OUPUT :pratchett.freenode.net NOTICE * :*** Looking up your hostname... :pratchett.freenode.net NOTICE * :*** Checking Ident :pratchett.freenode.net NOTICE * :*** Found your hostname :pratchett.freenode.net NOTICE * :*** No Ident response :pratchett.freenode.net 001 WhyYouMakeaMeBot :Welcome to the freenode Internet Relay Chat Network WhyYouMakeaMeBot :pratchett.freenode.net 002 WhyYouMakeaMeBot :Your host is pratchett.freenode.net[ /6667], running version ircd-seven-1.1.3
12 IRC Protocol IRC RFC IRC Over Telnet The message format Parameters: :<prefix> <command> <params> :<trailing> PRIVMSG #mychannel :Hello everyone!
13 Prefix Parameter The prefix of the messages represents the origin of the message, If there is no prefix, then the source of the message is the server for the current connection, as in the PING example. PING :wright.freenode.net The presence of a prefix is indicated by the message beginning with a colon character. The prefix cannot contain a white space so you can parse the first part and stop at the prefix. So in this example :write.freenode.net is the prefix :wright.freenode.net NOTICE * :*** Looking up your hostname
14 The Command Parameter The command part is the meat of the IRC message instructing your bot what action needs to be taken. Example Commands PRIVMSG, QUIT, JOIN, MODE, and PING. In the case of the PRIVMSG example, an bot might log a users message to the database, display it on the terminal or execute some command. With QUIT and JOIN, the Bot would keep change state to keep track a user has quit the server or joined the channel
15 Numeric Commands Some messages contain commands as text other messages have numeric replies. An IRC bot will receive numeric replies in the event it sends a requests to the irc server. Example we send the command NICK BadABot We Receive :irc.localhost.localdomain 433 BadABot:Nickname is already in use In the message the 433 portion is the command Looking in the RFC for the IRC protocol we see the reply of 433 is used if a nickname is already in use.
16 The Params Parameter The params portion is a set of space separated parameters. Not all messages have parameters, but many do. test@localhost PRIVMSG #channel :Hello The channel name (#channel) of the PRIVMSG, JOIN, and MODE messages is a parameter
17 The Trail The Trail is the last parameter and because params are separated by space, it isn't possible to include the trail parameter with a space in the normal set of parameters. The very last parameter is indicated with a leading colon, this means that everything after the colon should be interpreted together. This allows a message to carry one fully textual piece. Later we will further parse this string for our specific IRC BOT commands The defining characteristic of the trailing part is that it also begins with a colon but is preceded by a space. The trailing portions continues until the end of the message Simply grab the substring of the message that begins at the first occurrence of " :" (a space and colon).
18 Regular Expression Parsing import re string1 = ':wright.freenode.net NOTICE * :*** Looking up your hostname... regex = '^(:(\S+) )?(\S+)( (?!:)(.+?))?( :(.+))?$ matchobj = re.match(regex, string1, re.m re.i) if matchobj: print "matchobj.group() : ", matchobj.group() print "matchobj.group(1): ", matchobj.group(1) print "matchobj.group(2): ", matchobj.group(2) print "matchobj.group(3): ", matchobj.group(3) print "matchobj.group(4): ", matchobj.group(4) print "matchobj.group(5): ", matchobj.group(5) print "matchobj.group(6): ", matchobj.group(6) else: print "No match!!"
19 Code Parsing of IRC messages def parsemsg(s): prefix = '' trailing = [] if not s: raise IRCBadMessage("Empty line.") if s[0] == ':': prefix, s = s[1:].split(' ', 1) if s.find(' :')!= -1: s, trailing = s.split(' :', 1) args = s.split() args.append(trailing) else: args = s.split() command = args.pop(0) return prefix, command, args
20 Regex Sheep sheep_regex = '.*[ss$5]+[hh( - )]+[ee3]+[pp]+.* #metacortex if self.sheep and text.find(':!sheep_paging') == -1: regex_array = re.findall(self.sheep_regex,text) self.sendm(parsed_msg['handle'].split('!~')[0] + ' said \'sheep\'. Paging L34N. Someone said \'sheep\''); self.send_ (parsed_msg, self.sheep_number,"sheepalarm@dc801.com","sheep")
21 Text Messaging import smtplib SERVER = "10.x.x.1" FROM = "sender@example.com" TO = ["801xxxxxxx@vtext.com"] # must be a list SUBJECT = "Hello!" # Send the mail server = smtplib.smtp(server) server.sendmail(from, TO, message) server.quit() TEXT = "This message was sent with Python's smtplib. # Prepare actual message message = """\ From: %s To: %s Subject: %s %s """ % (FROM, ", ".join(to), SUBJECT, TEXT)
22 Basic Bot # Import some necessary libraries. import socket import time # Some basic variables used to configure the bot server = "chat.freenode.net" # Server channel = "#test198" # Channel botnick = "NemusBot2" # Your bots nick nicks = "NemusBot2" host_name = "Test
23 Basic Bot 2 # This is our first function! It will respond to server Pings. def ping(): ircsock.send("pong :pingis\n ) # This is the send message function, it simply sends messages to the channel. def sendmsg(chan, msg): ircsock.send("privmsg "+ chan +" :"+ msg +"\n ) # This function is used to join channels. def joinchan(chan): ircsock.send("join "+ chan +"\n ) # This function responds to a user that inputs "Hello Mybot" def hello(): ircsock.send("privmsg "+ channel +" :Hello!\n )
24 Basic Bot 3 ircsock = socket.socket(socket.af_inet, socket.sock_stream) # Here we connect to the server using the port 6667 ircsock.connect((server, 6667)) ircsock.send('user '+nicks+' host '+host_name+' : Nemus Brand Bot\r\n') # here we actually assign the nick to the bot ircsock.send("nick "+ botnick +"\n") # Join the channel using the functions we previously defined joinchan(channel)
25 Basic Bot 4 while 1: # receive data from the server ircmsg = ircsock.recv(2048) # removing any unnecessary linebreaks. ircmsg = ircmsg.strip('\n\r') # Here we print what's coming from the server print(ircmsg) # If we can find "Hello Mybot" it will call the function hello() if ircmsg.find(":hello "+ botnick)!= -1: hello() # if the server pings us then we've got to respond! if ircmsg.find("ping :")!= -1: ping()
26 Process Forking
27 Forking #!/usr/bin/env python """A basic forking action" import os def my_fork(): child_pid = os.fork() if child_pid == 0: print "Child Process: PID# %s" % os.getpid() else: print "Parent Process: PID# %s" % os.getpid() if name == " main ": my_fork()
28 Daemon Class #!/usr/bin/env python import sys, time from daemon import Daemon class MyDaemon(Daemon): def run(self): while True: time.sleep(1) #bot code here if name == " main ": daemon = MyDaemon('/tmp/daemonexample.pid') if len(sys.argv) == 2: if 'start' == sys.argv[1]: daemon.start() elif 'stop' == sys.argv[1]: daemon.stop() elif 'restart' == sys.argv[1]: daemon.restart() else: print "Unknown command sys.exit(2) sys.exit(0) else: print "usage: %s start stop restart" % sys.argv[0] sys.exit(2)
29 Speaking Bot SpeakingNemusBot
30 Simple IPC
31 Sqlite3 Simple IPC (Inter Process Communcation) import sqlite3 as lite self.con = lite.connect('/tmp/speakbot.db') cur = self.con.cursor() cur.execute("create TABLE if not exists talk ( id INTEGER PRIMARY KEY AUTOINCREMENT, handle TEXT, channel TEXT, message TEXT)") self.con.commit() cur = self.con.cursor() cur.execute('insert INTO talk(handle,channel,message) values (?,?,?)',(parsed_msg['handle'],parsed_msg['channel'],parsed_msg['text'])) self.con.commit()
32 Espeak for Speaking Bot while self.running: time.sleep(1) cur = self.con.cursor() cur.execute("select id,handle,channel,message from talk limit 1") rows = cur.fetchall() for row in rows: #print row speak = re.sub(r'[^\w]', ' ', row[3]) print row cmd = 'espeak -s 130 "%s"'% speak print cmd cur.execute("delete from talk where id =?",(row[0],)) self.con.commit()
33 Python Curl Web Calls import pycurl import json import StringIO c = pycurl.curl() c.setopt(c.url, ' money/ticker') c.setopt(c.connecttimeout, 5) c.setopt(pycurl.followlocation, 1) c.setopt(c.timeout, 8) try: c.perform() bitcoin_data = json.loads(b.getvalue()) print bitcoin_data except pycurl.error, error: errno, errstr = error print 'An error occurred: ', errstr b = StringIO.StringIO() c.setopt(c.cookiefile, '') c.setopt(c.failonerror, True) c.setopt(c.httpheader, ['Accept: application/json', 'Content-Type: application/x-www-formurlencoded']) c.setopt(pycurl.writefunction, b.write)
34 Executing a command getting output ########### pg1 import subprocess output=subprocess.popen(["ls", "-lah"], stdout=subprocess.pipe,stderr=subprocess.pipe).communica te() print output ################### pg2 import os retvalue = os.system( ls") print retvalue Goes to standard out
35 Command Function def command(msg): regex = '^(:(\S+) )?(\S+)( (?!:)(.+?))?( :(.+))?$' matchobj = re.match(regex, msg, re.m re.i) trail = matchobj.group(6) commands = trail.split() commands.remove(commands[0]) # remove first part of the trail print commands output=subprocess.popen(commands, stdout=subprocess.pipe,stderr=subprocess.pipe).communicate() pre = "PRIVMSG "+ channel +" :"+str(output)+"\n" ircsock.send(pre)
36 Authorization import hmac, time from hashlib import sha1 from base64 import b64encode, b64decode def validate_sig(msg,salt): rslt = command_sig.split(' ') sig_time = rslt[1].split(':')[1] def generate_sig(msg,salt): sig_cmd sig = rslt[2] = rslt[3].split(':')[1] signature = hmac.new(salt,msg,sha1).hexdigest() command = msg + ' signature:'+signature return command now = time.time() time_diff = abs(float(sig_time) - now) if time_diff < 5.00 : command = rslt[0]+' '+rslt[1] + ' '+rslt[2] print command gen_signature = hmac.new(salt,command,sha1).hexdigest() if gen_signature == sig: else: return True return False
37 Encryption import gnupg gpg = gnupg.gpg(gnupghome='/home/testgpguser/gpghome') unencrypted_string = 'Who are you? How did you get in my house?' encrypted_data = gpg.encrypt(unencrypted_string, 'testgpguser@mydomain.com') encrypted_string = str(encrypted_data) print 'ok: ', encrypted_data.ok print 'status: ', encrypted_data.status print 'stderr: ', encrypted_data.stderr print 'unencrypted_string: ', unencrypted_string print 'encrypted_string: ', encrypted_string
38 Next Phase Nemus WoRm! SSH Brute Forcing Twisted Python Conch examples/ VNC Brute Forcing and Control RDP using rdesktop
39 San's Paper on Writing Code for BotNets whitepapers/covert/byob-build-botnet_33729
40 That s it for the Sexy Boting
20.12. smtplib SMTP protocol client
20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of
More informationlatest Release 0.2.6
latest Release 0.2.6 August 19, 2015 Contents 1 Installation 3 2 Configuration 5 3 Django Integration 7 4 Stand-Alone Web Client 9 5 Daemon Mode 11 6 IRC Bots 13 7 Bot Events 15 8 Channel Events 17 9
More informationImplementing an IRC Server Using an Object- Oriented Programming Model for Concurrency
Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Bachelor Thesis Fabian Gremper ETH Zürich fgremper@student.ethz.ch May 17, 2011 September 25, 2011 Supervised by:
More informationConfiguring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
More informationIRC - Internet Relay Chat
IRC - Internet Relay Chat Protocol, Communication, Applications Jenisch Alexander ajenisch@cosy.sbg.ac.at Morocutti Nikolaus nmoro@cosy.sbg.ac.at Introduction Facts. How it works. IRC specifiaction. Communication.
More informationCisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
More informationRemote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
More informationクラウド 開 発 演 習 ( 課 題 解 決 型 学 習 ) (C1) SaaS
クラウド 開 発 演 習 ( 課 題 解 決 型 学 習 ) (C1) SaaS ソフトウェア クラウド 開 発 プロジェクト 実 践 III 浅 井 大 史 2015 年 5 月 22 日 (C1) SaaS Goal Scalable design of so8ware (as a service) Cloud PBL 2 Cloud PBL 3 What does scalable mean?
More informationApplication Note 49. Using the Digi TransPort Fleet Card. October 2011
Application Note 49 Using the Digi TransPort Fleet Card October 2011 Contents 1 INTRODUCTION... 3 1.1 Outline... 3 1.2 Assumptions... 3 1.3 Corrections... 3 1.4 Version... 3 2 Fleet card Features... 4
More informationFile Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
More informationRemote Access API 2.0
VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,
More informationgpio.ipcore: Manual Copyright 2015 taskit GmbH
gpio.ipcore Manual gpio.ipcore: Manual Copyright 2015 taskit GmbH gpio.ipcore All rights to this documentation and to the product(s) described herein are reserved by taskit GmbH. This document was written
More informationIRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss
IRC-Client IRC Group: Arne Bochem, Benjamin Maas, David Weiss September 1, 2007 Contents 1 Introduction 2 1.1 Description.............................. 2 1.2 Motivation.............................. 2
More information24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi. OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2
24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2 PROBLEMA REALE In un database nella Tabella: account_move il Campo: id_partner
More informationPyak47 - Performance Test Framework. Release 1.2.1
Pyak47 - Performance Test Framework Release 1.2.1 November 07, 2015 Contents 1 Performance & Load Tests in Python 3 2 Site Menu 5 2.1 Detailed Install and Setup........................................
More informationReadyNAS Remote Troubleshooting Guide NETGEAR
ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are
More informationHow To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
More informationThe ScoutLink Operators Manual. For IRC Operators
The ScoutLink Operators Manual For IRC Operators 1 Table of Contents 1 Table of Contents... 2 2 Introduction... 3 3 OPER... 4 4 #Services.log... 4 5 HELPSYS... 5 6 SAMODE... 5 6.1 Regular channel modes...
More informationDepartment of Engineering Science. Understanding FTP
Understanding FTP A. Objectives 1. Practice with ftp servers and learn how o measure network throughput 2. Learn about basic Python Network Programing B. Time of Completion This laboratory activity is
More informationTREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE
TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE April 2016 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 1 1.1 Getting Started... 1 1.2 System
More informationThe Konversation Handbook. Gary R. Cramblitt
Gary R. Cramblitt 2 Contents 1 Introduction 6 2 Using Konversation 7 2.1 If you haven t used IRC before................................ 7 2.2 Setting your identity.................................... 9
More informationshodan-python Documentation
shodan-python Documentation Release 1.0 achillean June 24, 2016 Contents 1 Introduction 3 1.1 Getting Started.............................................. 3 2 Examples 5 2.1 Basic Shodan Search...........................................
More informationThe HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta shomiron@lycos.co.uk 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
More informationWireless Communication With Arduino
Wireless Communication With Arduino Using the RN-XV to communicate over WiFi Seth Hardy shardy@asymptotic.ca Last Updated: Nov 2012 Overview Radio: Roving Networks RN-XV XBee replacement : fits in the
More informationUlogd2, Advanced firewall logging
Ulogd2, Advanced firewall logging INL 172 rue de Charonne 75011 Paris, France RMLL 2009, July 8, Nantes Ulogd2, Netfilter logging reloaded 1/ 38 Some words about me NuFW main developper INL co-founder
More informationFireEye App for Splunk Enterprise
FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard
More informationIP Power Stone 4000 User Manual
IP Power Stone 4000 User Manual Two Outlet Remote AC Power Controller Multi Link, Inc. 122 Dewey Drive Nicholasville, KY 40356 USA Sales and Tech Support 800.535.4651 FAX 859.885.6619 techsupport@multi
More informationPIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
More information15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server
15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server Lead TA: Daegun Won Assigned: January 21, 2010 Checkpoint 1 due: January 26, 2010 Checkpoint 2 due: February
More informationCLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
More information+ iptables. packet filtering && firewall
+ iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?
More informationCOMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
More informationGSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2
GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers
More informationFachgebiet Technische Informatik, Joachim Zumbrägel
Computer Network Lab 2015 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages
More informationCommunicating with a Barco projector over network. Technical note
Communicating with a Barco projector over network Technical note MED20080612/00 12/06/2008 Barco nv Media & Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.89.70 Fax: +32 56.36.883.86
More informationLecture 29: Bots and Botnets. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.edu)
Lecture 29: Bots and Botnets Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 22, 2015 1:28pm c 2015 Avinash Kak, Purdue University Goals: Bots and bot masters Command and
More informationConfiguring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
More informationCross-platform TCP/IP Socket Programming in REXX
Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,
More informationTable of Contents. Configuring IP Access Lists
Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message
More informationPIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example
PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products
More informationMission 1: The Bot Hunter
Mission 1: The Bot Hunter Mission: Interpol have asked the BSidesLondon Unhackable Mission Force to penetrate and shut down a notorious botnet. Our only clue is a recovered bot executable which we hope
More informationTFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors
CSCE 515: Computer Network Programming ------ TFTP + Errors Wenyuan Xu Department of Computer Science and Engineering University of South Carolina TFTP Usage and Design RFC 783, 1350 Transfer files between
More informationInternet-bridge XPort
Ing. Z.Královský Ing. Petr Štol Perk 457 Okrajová 1356 675 22 STA 674 01 T EBÍ Development & production of control equipment Tel.: 568 870982 Tel.: 568 848179 Visualization, measurement and regulation
More informationSybase Advantage Database Server 11: A First Look
white paper Sybase Advantage Database Server 11: A First Look by Cary Jensen www.sybase.com Table of Contents 1 Advantage Web Platform 3 Online Maintenance 5 SQL Enhancements 11 Connection Enhancements
More informationMonitoring the Firewall Services Module
24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide
More informationService for checking whether an email is operative or not. Validate email ids in your databases.
MailStatus API Service for checking whether an email is operative or not. Validate email ids in your databases. Overview Lleida.net MailStatus API allows you to consult the validity of an email address.
More informationProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
More informationFile Transfer Protocol (FTP) & SSH
http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.
More informationsmtp-user-enum User Documentation
smtp-user-enum User Documentation pentestmonkey@pentestmonkey.net 21 January 2007 Contents 1 Overview 2 2 Installation 2 3 Usage 3 4 Some Examples 3 4.1 Using the SMTP VRFY Command................. 4 4.2
More informationPython. Network. Marcin Młotkowski. 24th April, 2013
Network 24th April, 2013 1 Transport layer 2 3 4 Network layers HTTP, POP3, SMTP, FTP Transport layer TCP, UDP Internet User Datagram Protocol (UDP) Features of UDP Very easy Unreliable: no acknowledgment,
More informationQuectel Cellular Engine
Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.00 Document Title HTTP Service AT Commands Version 1.00 Date 2009-07-06 Status Document Control ID Release GSM_HTTP_ATC_V1.00 General Notes offers
More informationTutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired
Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip
More informationWe will learn the Python programming language. Why? Because it is easy to learn and many people write programs in Python so we can share.
LING115 Lecture Note Session #4 Python (1) 1. Introduction As we have seen in previous sessions, we can use Linux shell commands to do simple text processing. We now know, for example, how to count words.
More informationGreen Telnet. Making the Client/Server Model Green
Green Telnet Reducing energy consumption is of growing importance. Jeremy and Ken create a "green telnet" that lets clients transition to a low-power, sleep state. By Jeremy Blackburn and Ken Christensen,
More informationNAME smtp zmailer SMTP client transport agent
NAME smtp zmailer SMTP client transport agent SYNOPSIS smtp [ 1678deEHMrPsVxXW ] [ A /path/to/smtp-auth-secrets.txt ] [ c channel] [ h heloname] [ l logfile] [ O options] [ p remote-port] [ T timeouts]
More informationShellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
More informationMXSAVE XMLRPC Web Service Guide. Last Revision: 6/14/2012
MXSAVE XMLRPC Web Service Guide Last Revision: 6/14/2012 Table of Contents Introduction! 4 Web Service Minimum Requirements! 4 Developer Support! 5 Submitting Transactions! 6 Clients! 7 Adding Clients!
More informationAutomating Operations on z/vm and Linux on System z
Automating Operations on z/vm and Linux on System z Operations Manager for z/vm Tracy Dean, IBM tld1@us.ibm.com April 2009 Operations Manager for z/vm Increase productivity Authorized users view and interact
More informationVoxStack GSM Gateway API. Version: 1.0.0. Author: Joe.Yung
VoxStack GSM Gateway API Version: 1.0.0 Author: Joe.Yung Change Notes Date Versions Description Author 2013.2.6 1.0.0 GSM Gateway Joe.Yung SMS API 1. Configuring AMI in VoxStack GSM Gateway. 1.1 How to
More information1. Stem. Configuration and Use of Stem
Configuration and Use of Stem 1. Stem 2. Why use Stem? 3. What is Stem? 4. Stem Architecture 5. Stem Hubs 6. Stem Messages 7. Stem Addresses 8. Message Types and Fields 9. Message Delivery 10. Stem::Portal
More informationThe exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.
CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]
More informationChapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
More informationLinux Networking: IP Packet Filter Firewalling
Linux Networking: IP Packet Filter Firewalling David Morgan Firewall types Packet filter Proxy server 1 Linux Netfilter Firewalling Packet filter, not proxy Centerpiece command: iptables Starting point:
More informationLOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationHands-on MESH Network Exercise Workbook
Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network
More informationERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
More informationQuick Connect. Overview. Client Instructions. LabTech
LabTech Quick Connect QUICK CONNECT 1 Overview... 1 Client Instructions... 1 Technician Instructions... 4 VNC... 5 RDP... 6 RAssist (Remote Assistance)... 8 IE (Internet Explorer browser)... 9 CMD... 10
More informationGSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1
GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes
More informationRMCS Installation Guide
RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
More informationLR Product Documentation Documentation
LR Product Documentation Documentation Release 2.5 The LR Team February 10, 2015 Contents 1 Getting Started Guide 1 1.1 Overview................................................. 1 1.2 About the Examples...........................................
More informationTCP/UDP # General Name Short Description
This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found
More informationADB (Android Debug Bridge): How it works?
ADB (Android Debug Bridge): How it works? 2012.2.6 early draft Tetsuyuki Kobayashi 1 Let's talk about inside of Android. http://www.kmckk.co.jp/eng/kzma9/ http://www.kmckk.co.jp/eng/jet_index.html 2 Who
More informationLab 5: HTTP Web Proxy Server
Lab 5: HTTP Web Proxy Server In this lab, you will learn how web proxy servers work and one of their basic functionalities caching. Your task is to develop a small web proxy server which is able to cache
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationBiznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
More informationHow To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel
itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1
More informationConfiguring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
More informationEvaluation of standard monitoring tools(including log analysis) for control systems at Cern
Evaluation of standard monitoring tools(including log analysis) for control systems at Cern August 2013 Author: Vlad Vintila Supervisor(s): Fernando Varela Rodriguez CERN openlab Summer Student Report
More informationTunnels and Redirectors
Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationIntroduction to CloudScript
Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that
More informationMAX T1/E1. Quick Start Guide. VoIP Gateway. Version 1.0
MAX T1/E1 TM VoIP Gateway Quick Start Guide Version 1.0 Contents INTRODUCTION 1 Hardware Needed Software Needed 1 1 NET2PHONE MAX SET UP Hardware Set Up Software Set Up Set Up Internet Protocol (IP) Address
More informationApplication Monitoring using SNMPc 7.0
Application Monitoring using SNMPc 7.0 SNMPc can be used to monitor the status of an application by polling its TCP application port. Up to 16 application ports can be defined per icon. You can also configure
More informationThere are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):
Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine
More informationLabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
More informationBeginners Shell Scripting for Batch Jobs
Beginners Shell Scripting for Batch Jobs Evan Bollig and Geoffrey Womeldorff Before we begin... Everyone please visit this page for example scripts and grab a crib sheet from the front http://www.scs.fsu.edu/~bollig/techseries
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More informationPing Device Driver Help. 2009 Schneider Electric
2009 Schneider Electric 1 Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 2 Device Setup... 2 Device Setup... 2 3 Automatic Tag... Database Generation 2 Automatic Tag... Database
More informationConfiguring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
More informationLifeSize UVC Access Deployment Guide
LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address
More informationGregSowell.com. Mikrotik Security
Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.
More informationMini-Challenge 3. Data Descriptions for Week 1
Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes
More informationOPS535 Advanced Network Administration. SMTP Lab SIMPLE MAIL TRANSFER PROTOCOL
SMTP Lab Reference: RFC821 Simple Mail Transfer Protocol SIMPLE MAIL TRANSFER PROTOCOL 1. INTRODUCTION The objective of Simple Mail Transfer Protocol (SMTP) is to transfer mail reliably and efficiently.
More informationHigh speed networks and distributed systems Oxford Brookes MSc dissertation. IRC distributed bot lending platform: The Loufiz project
High speed networks and distributed systems Oxford Brookes MSc dissertation Subject: IRC distributed bot lending platform The Loufiz project Dissertation Supervisor: Faye Mitchell Field code: DSD Module
More informationExercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationBuilding a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home
Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house
More informationSeminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
More informationManual. Programmer's Guide for Java API
2013-02-01 1 (15) Programmer's Guide for Java API Description This document describes how to develop Content Gateway services with Java API. TS1209243890 1.0 Company information TeliaSonera Finland Oyj
More information