20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

88<br />

BotnetS<br />

Normally when you load an agent onto a different node from<br />

your commlink, you maintain an active subscription to that agent,<br />

issuing orders and receiving feedback in real time with a minimum of<br />

hassle. Naturally, your active subscriptions limit the number of agents<br />

you can have running at once. To get around that, instead of maintaining<br />

active subscriptions you can link your agents into a network—a<br />

botnet. A botnet isn’t as slick as an active subscription, but if you’re<br />

looking to recruit a codezombie army of doom, it’s a good start.<br />

By itself you might think a botnet is simply a useful tool for<br />

managing a lot of agents, but the implications for hackers are huge.<br />

With a botnet you can keep tabs on dozens of nodes at once, setting<br />

up some truly righteous hacks. Most really organized Matrix<br />

gangs and syndicate Matrix crime crews use botnets for distributed<br />

denial of service (DDOS) attacks, extending their traditional protection<br />

rackets and blackmail operations into the Sixth World. A<br />

DDOS attack uses scores or hundreds of bots on different nodes<br />

to connect to a single node at the same time, usually preventing all<br />

traffic into and out of the node—quite a killer for a commercial<br />

node, and well worth it to online merchants to pay a “protection”<br />

fee against the possibility of it happening to them.<br />

> Sometimes when you can’t pull off a big hack, you can use a botnet<br />

to pull off a lot of little hacks that add up to the same thing.<br />

Perfect example: traffic control. Hacking the individual lights and<br />

using bots to control them can be a hell of a lot easier than hacking<br />

the central traffic node.<br />

> Turbo Bunny<br />

> Unless, like in Hong Kong, all of the traffic lights are slaved to the<br />

central node anyway, in which case you have no choice but to hack it.<br />

Or in New York, where the lights are tied into the GridGuide system<br />

for better traffic flow control.<br />

> Traveler Jones<br />

See, it’s not just hackers that use botnets—it’s corps too! How<br />

do you think AZT manages its fleets of spambots, or MCT datafarms<br />

millions of customer datafiles every day? Their experts use<br />

botnets to direct and control fleets of agents, and if you know what<br />

to look for you can take control of one or more of their bots and<br />

get them to work for you—at least, until the wageslave managing<br />

the botnet notices something weird is going on.<br />

While the corps don’t like to talk about it, botnets are also a<br />

way for them to wage war on one another through the Matrix. It’s a<br />

rarely used tactic for a megacorp to directly fuck with another megacorporate<br />

node with a botnet because of the fear of reprisals from<br />

the Corporate Court; current Matrix warfare theory holds that if<br />

two AAA-rated megacorps decided to engage in a full-scale Matrix<br />

conflict, botnets would feature prominently in the strategy.<br />

tHe art of war<br />

Posted By: Pistons<br />

To a combat hacker like me, the Matrix is a battlefield.<br />

Espionage, siegecraft, stratagems, the parry and thrust of cybercombat.<br />

The kid’s covered some of the basic weapons you’ll have<br />

in your conflicts across the Matrix, so what you need now is the<br />

down-and-dirty of the tactics hackers use. A little strategy and the<br />

right weapon can win any war.<br />

MaSS proBeS<br />

The key to a successful botnet isn’t getting a lot of agents—<br />

you can copy those programs for free. What you really need is a<br />

large number of nodes to run your agents on. That’s where a mass<br />

probe comes in. It starts off by having a large list of potential<br />

targets—hacker nexi usually have dozens of these lists around, but<br />

you can use the Yellow Pages node if you really want to. There<br />

are different strategies and mathematical formulae to optimize<br />

the methodology, but in essence a mass probe is a very quick and<br />

direct attack on a node to see if it responds—if it does, you break<br />

off quick, if it doesn’t you log it. Either way, you move on down<br />

to the next node on the list. After a couple hours of dedicated<br />

probing, you’ll have a list of poorly defended nodes that should be<br />

a cinch to load your agents into.<br />

> You can also mass probe to create a botnet and then have the<br />

agents on the botnet mass probe and replicate to create more botnets,<br />

etc. That’s how the most malicious worms spread. The Grid<br />

Overwatch Division and local authorities keep an eye out for that<br />

type of thing, though, and try to nip it in the bud.<br />

> Cosmo<br />

MaSS attackS<br />

Hackers are generally solo types, untrusting and untrustworthy<br />

of other hackers.<br />

> Hey! I resemble that.<br />

> Puck<br />

Still, hackers also have a long tradition of teamwork and cooperation<br />

with other hackers for really big hacks. A mass attack is just<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!