trickery.net  

Go Back   trickery.net > Technical > Software & Security

Reply
 
Thread Tools
Old 28-May-2010, 13:33   #1
Scrobbs
Sunnyvale Supervisor
Scrobbs's Avatar
Join Date: Oct 2003
Location: In the pipe, five by five.
Posts: 16,496
Scrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond reputeScrobbs has a reputation beyond repute
Gaming accounts validated by distributed computing

http://www.symantec.com/connect/blog...ials-uncovered

Interesting.

Quote:
3. Write a program that checks the login details and then distribute the program to multiple computers.

By taking advantage of the distributed processing that the third option offers, you can complete the task more quickly and help mitigate the multiple-login failure problems by spreading the task over more IP addresses. This is what Trojan.Loginck’s creators have done.

Most botnets have the ability to download and run files, so why not push a custom piece of malware to each bot? The malware could log on to the database and download a group of user names and passwords in order to check them for validity.

If the Trojan succeeds in its task of logging in, it will update the database with the time it logged in and any user credentials (such as current game level, etc.) before moving to the next user name and password. The attackers can then log on to the database and search for the valid user name and password combinations.
__________________
http://bit.ly/debatethebill

Last edited by Scrobbs; 28-May-2010 at 13:36.
Scrobbs is offline  
Reply With Quote
Old 28-May-2010, 13:36   #2
Q-Target
AKA QuebecTango
Q-Target's Avatar
Join Date: Oct 2003
Location: Not Brighton
Posts: 36,921
Q-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond reputeQ-Target has a reputation beyond repute
They'll never crack my "just shove a 1 on the end" password technique!
Q-Target is offline  
Reply With Quote
Old 28-May-2010, 16:44   #3
Bleh
posts for a living
Bleh's Avatar
Join Date: Jan 2004
Location: Stoke on Trent
Posts: 4,294
Bleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond reputeBleh has a reputation beyond repute
lol Q
__________________
There's No Place Like 127.0.0.1
Bleh is offline  
Send a message via MSN to Bleh  bleh82 
Reply With Quote
Reply

Go Back   trickery.net > Technical > Software & Security


Users Viewing Thread: 1 (0 members and 1 guests)
 

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT +1. The time now is 03:12.


Powered by vBulletin® Version 3.7.0 Release Candidate 3
Copyright ©2000 - 2018, Jelsoft Enterprises Ltd.
Copyright ©2003 - 2013, trickery.net