comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
88<br />
BotnetS<br />
Normally when you load an agent onto a different node from<br />
your commlink, you maintain an active subscription to that agent,<br />
issuing orders and receiving feedback in real time with a minimum of<br />
hassle. Naturally, your active subscriptions limit the number of agents<br />
you can have running at once. To get around that, instead of maintaining<br />
active subscriptions you can link your agents into a network—a<br />
botnet. A botnet isn’t as slick as an active subscription, but if you’re<br />
looking to recruit a codezombie army of doom, it’s a good start.<br />
By itself you might think a botnet is simply a useful tool for<br />
managing a lot of agents, but the implications for hackers are huge.<br />
With a botnet you can keep tabs on dozens of nodes at once, setting<br />
up some truly righteous hacks. Most really organized Matrix<br />
gangs and syndicate Matrix crime crews use botnets for distributed<br />
denial of service (DDOS) attacks, extending their traditional protection<br />
rackets and blackmail operations into the Sixth World. A<br />
DDOS attack uses scores or hundreds of bots on different nodes<br />
to connect to a single node at the same time, usually preventing all<br />
traffic into and out of the node—quite a killer for a commercial<br />
node, and well worth it to online merchants to pay a “protection”<br />
fee against the possibility of it happening to them.<br />
> Sometimes when you can’t pull off a big hack, you can use a botnet<br />
to pull off a lot of little hacks that add up to the same thing.<br />
Perfect example: traffic control. Hacking the individual lights and<br />
using bots to control them can be a hell of a lot easier than hacking<br />
the central traffic node.<br />
> Turbo Bunny<br />
> Unless, like in Hong Kong, all of the traffic lights are slaved to the<br />
central node anyway, in which case you have no choice but to hack it.<br />
Or in New York, where the lights are tied into the GridGuide system<br />
for better traffic flow control.<br />
> Traveler Jones<br />
See, it’s not just hackers that use botnets—it’s corps too! How<br />
do you think AZT manages its fleets of spambots, or MCT datafarms<br />
millions of customer datafiles every day? Their experts use<br />
botnets to direct and control fleets of agents, and if you know what<br />
to look for you can take control of one or more of their bots and<br />
get them to work for you—at least, until the wageslave managing<br />
the botnet notices something weird is going on.<br />
While the corps don’t like to talk about it, botnets are also a<br />
way for them to wage war on one another through the Matrix. It’s a<br />
rarely used tactic for a megacorp to directly fuck with another megacorporate<br />
node with a botnet because of the fear of reprisals from<br />
the Corporate Court; current Matrix warfare theory holds that if<br />
two AAA-rated megacorps decided to engage in a full-scale Matrix<br />
conflict, botnets would feature prominently in the strategy.<br />
tHe art of war<br />
Posted By: Pistons<br />
To a combat hacker like me, the Matrix is a battlefield.<br />
Espionage, siegecraft, stratagems, the parry and thrust of cybercombat.<br />
The kid’s covered some of the basic weapons you’ll have<br />
in your conflicts across the Matrix, so what you need now is the<br />
down-and-dirty of the tactics hackers use. A little strategy and the<br />
right weapon can win any war.<br />
MaSS proBeS<br />
The key to a successful botnet isn’t getting a lot of agents—<br />
you can copy those programs for free. What you really need is a<br />
large number of nodes to run your agents on. That’s where a mass<br />
probe comes in. It starts off by having a large list of potential<br />
targets—hacker nexi usually have dozens of these lists around, but<br />
you can use the Yellow Pages node if you really want to. There<br />
are different strategies and mathematical formulae to optimize<br />
the methodology, but in essence a mass probe is a very quick and<br />
direct attack on a node to see if it responds—if it does, you break<br />
off quick, if it doesn’t you log it. Either way, you move on down<br />
to the next node on the list. After a couple hours of dedicated<br />
probing, you’ll have a list of poorly defended nodes that should be<br />
a cinch to load your agents into.<br />
> You can also mass probe to create a botnet and then have the<br />
agents on the botnet mass probe and replicate to create more botnets,<br />
etc. That’s how the most malicious worms spread. The Grid<br />
Overwatch Division and local authorities keep an eye out for that<br />
type of thing, though, and try to nip it in the bud.<br />
> Cosmo<br />
MaSS attackS<br />
Hackers are generally solo types, untrusting and untrustworthy<br />
of other hackers.<br />
> Hey! I resemble that.<br />
> Puck<br />
Still, hackers also have a long tradition of teamwork and cooperation<br />
with other hackers for really big hacks. A mass attack is just<br />
Unwired<br />
Simon Wentworth (order #1132857) 9