Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Botnet in Python3 - DDoS + self-rep

NotificationsYou must be signed in to change notification settings

waived/exile-botnet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

██████████████████      ██  ██████  ██      ██  ██████      ███████████████████████████████  ████████  ██   █████  ████  ██████  ███████████████████▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓    ▓▓▓▓▓▓▓▓   ▓▓▓▓▓▓▓  ▓▓▓▓  ▓▓▓▓▓▓    ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒  ▒▒▒▒▒▒▒▒   ▒  ▒▒▒▒▒▒  ▒▒▒▒  ▒▒▒▒▒▒  ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░      ░░   ░░░░░  ░░      ░░      ░░      ░░░░░░░░░░░░░░░░░░──────────────────────────────────────────────────────────────────────────                                  ABOUT──────────────────────────────────────────────────────────────────────────Program: Exile Botnet (server + client) / Proof-of-ConceptServer version: 3.0Client version: 19.0Languages: Python 3.11.9           Shell BASH/SHTested on: KaOS amd64 minimal-2024           Kali Linux 2024.1           Ubuntu 24.01           Microsoft Windows 11 (Version 23H2)           C2 communication method: TCP sockets           Effected platforms: Linux/Unix environments           Author: Waived──────────────────────────────────────────────────────────────────────────                               CAPABILITIES ──────────────────────────────────────────────────────────────────────────--- Denial-of-Service    ExileBot weilds a total of fourteen different attack vectors, based on    standard UDP, TCP, and the HTTP protocol.    --- Binary Loader    Exile also acts as a loader, where C, PY, SH, and ELF files can be    loaded and executed on the client machines.    --- C2 manipulation    Like any bot/loader, Exile's C2 infrastructure allows for TCP connection    manipulation: termination of connections, refreshing of connections, and    disconnection from TCP connections. Additionally, ExileBot provides the    option to update the current running client with a more recent build.     --- Self-replication    Once a client/s are connected to the C2, at the command of the botmaster,    said client/s can then begin scanning the internet for hosts that are    running SSH and Telnet services. Via password spraying of commonly used    credentials, ExileBot attempts to hijack a session and inject a copy of    the client onto said machines. This allows for Exile to gain a wider scope    of connected machines.    --- Anti-viral manuvers    Exile makes use of a BotKiller, or routine that will check for suspicious    processes that are known to belong to other Bots, Loaders, Vertexes, etc.    ──────────────────────────────────────────────────────────────────────────                             ATTACK FUNCTIONS ──────────────────────────────────────────────────────────────────────────--- UDP:     Standard junk flood via UDP. Dynamic data buffer with non-fixed length.--- TCP:    Standard junk flood via UDP. Dynamic data buffer with non-fixed length.--- RHEX:    UDP flood using random hexadecimal values. Dynamic data buffer with non-    fixed length. Effective against some OVH-based services.    --- HTTPBYPASS:    An HTTP-GET flood that implements proxification per each request. HTTP    headers such as User-agent, Referer, and URI query are randomized.     Effective against CDNs, WAFs, and other reverse-proxy implementations.    --- HOLD:    Much like the 'Xerxes' attack, a HOLD flood will open a series of TCP    sockets. After the user-specified delay has passed, a null byte '\x00'    will be send through the sockets to keep them alive. If used against    single thread-based socket spawning services such Apache Tomcat,     Microsoft IIS, dhttpd Dart, etc, one machine can take a server down.    However, HTTP services such as NGINX can manage this quite well. In    terms of a botnet, will several hundred if not several thousand clients    requesting socket-connections all at once, even such service can be    crippled. Effectivity in lies on the amount of clients connected to Exile.    --- RECOIL:    Originally taken from NewEraCracker's LOIC HiveMind edition, the ReCoil    flood is a slow-download attack via HTTP. The botmaster will find a site    that is hosting a relatively large file. Once the download on the client    machine has started, each byte is streamed to the client over the TCP    socket very slowly. The botmaster will specify the delay in seconds before    receiving the next byte in the sequence. Alike the HOLD flood, the more    clients acting against the specific file will yield a greater ability to    paralyze the target.    --- STDHEX:    Modeled off of the well known STD.c attack, and STD packet via UDP, using    hexadecimal values will be send to the target. The data-buffer in each    UDP packet will not exceed 50 bytes, however this method is a PPS dependent    flood, where the volume to requests are hurled at the target in a rapid    succession.    --- QUAKE3:    A UDP-based attack that effects Quake V3 gaming servers. Each packet makes    use of QUAKE3 query vulnerabilities.    --- HTTP:    Standard HTTP flood with user-agent randomization and keep-alive headers.    TCP socket responsible for sending the HTTP headers will remain open until    forcibly closed by the endpoint. Upon closure, more sockets are spawned     until duration is complete or cancelled by the botmaster.    --- FIVE-M:    A UDP-based attack that effects GTA-V (Grand Theft Auto 5) modding game-    servers. Each packet makes use of FIVE-M query vulnerabilities.    --- HTTPHEX:    An HTTP-GET flood that appends junk hexadecimal payloads at the end of    each HTTP request. User-agent randomization and keep-alive headers are    sent.    --- TLS:    This attack attempts to exhaust SSL/TLS slates on HTTPS protected    websites. It begins the TLS encryption process, then drops the connection    and quickly spawns a new TLS agreement. This process is done repeatedily    over the same TCP socket until forcibly closed by the endpoint. Upon     closure, more sockets are spawned until duration is complete or cancelled    by the botmaster.     --- VSE:    This UDP-based attack manipulates the VSE (Value Source Engine) protocol    on game-servers ran by the gaming platform Steam. Each packet makes use     of VSE query vulnerabilities.    --- TS3:    This UDP-based attack manipulates the TS3 (Team Speak Ver3.0) protocol    on TS3-servers. Each packet makes use of TS3 query vulnerabilities.──────────────────────────────────────────────────────────────────────────                             NOTABLE FEATURES ──────────────────────────────────────────────────────────────────────────SERVER:=======Clear:Simply put, this command will clear the terminal environment of Exile toallow for a more clear working interface.Goodbye:This command was designed to eliminate the <CTRL+C> abort feature inPython and to safely power-down the TCP Listener and other currentlyrunning routines.  V&:The V& ("vanned") command is a panic feature. Once executed, Exilewill terminate all client connection via the "uninstall" command.It also will self terminate (via BASH) by deleting the activeserver.py script.Be careful! There is no confirmation when processing this request!=======CLIENT:=======Resurrection:Upon execution, the client will locate the Linux/Unix CronTab (if supported)and will (via BASH) add itself to the CronTab. Per every reboot, Exile willreconnect to the C2.Connection management:Exile will take commands from the C2 in regards to the active TCP connectionrunning on the machine. At any given point, the client wields the abilityto either restart the connection to the C2, drop it entirely, or "uninstall"which not only drops the connection but (via BASH) will self-destruct the clientscript entirely.Verbose output:Since ExileBot serves as a POC and for the purpose of dev-testing, the clientwill output verbose information after connecting/reconnection to the C2 andwhen processing commands.SERVER:=======    ──────────────────────────────────────────────────────────────────────────                           KNOWN BUGS / ISSUES──────────────────────────────────────────────────────────────────────────ExileBot aims to make multi-platform Linux/Unix use smooth and compatiblewith as many systems as possible. It is possible that due to certain systemlimitations or lack of permissions, ExileBot is unable properly process acommand. At any point be sure to leave a bug report!Keyboard Interrupt:Whereas the 'disconnect' command from the C2 functions flawlessly, using thekeyboard interrupt <CTRL+C> maybe yeild an interrupt-error when breaking. Thisdoesn't necessarily need handeled since the client should run silently on theinfected machine without hinderance.Disconnect:Because of certain activity during data transversal, taking the 'disconnect' command from the C2 may not exit immediately. The TCP socket may hang forup to another 30 seconds before exiting. This is more of a performance issuerather than an actual bug.Anything else that may arise during execution of ExileBot that does notwork correctly, please leave a bug report.──────────────────────────────────────────────────────────────────────────                              AUTHOR'S NOTES──────────────────────────────────────────────────────────────────────────Python is an interpreted language, NOT compiled! This means two things:    1) Since Python is interpreted, it is slower than other compiled       languages like C, Delphi, GoLang, etc. It may not be as suitable       in the field for this reason alone.           2) Because ExileBot is not compiled, the server/client can simply be       opened up/viewed. There is no ability to hide the C2 connections       within the code. This may requires some level of third-party       obfuscation.Additionally, there is no level of encryption/encoding between the serverand clients. Having encryption would be a beneficial feature to have whenconducing illicit activities. I felt no reason to include such a feature.──────────────────────────────────────────────────────────────────────────                              LEGAL STATEMENT──────────────────────────────────────────────────────────────────────────By downloading, modifying, redistributing, and/or executing ExileBot, theuser agrees to the contained LEGAL.txt statement found in this repository.I, Waived, the creator, take no legal responsibility for unlawful actionscaused/stemming from this program. Use responsibly and ethically!

[8]ページ先頭

©2009-2025 Movatter.jp