Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 3 Vote(s) - 3.67 Average


Leak BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT filter_list
Author
Message
RE: BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT #11
(11-14-2015, 10:32 AM)mahsat92 Wrote: is infected with backdoor

Please provide proof so I may address this issue. Regards.
---
Click here to get started with Linux!

If I helped you, please +rep me, apparently we've started over on Rep and I'd like to break 100 again...

Inori Wrote: got clickbaited by roger

Reply

RE: BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT #12
Shitty python script probably outputs what <1000 req/s
Same script in c would do 50k

Reply

RE: BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT #13
(11-14-2015, 04:49 PM)roger_smith Wrote: Please provide proof so I may address this issue. Regards.

https://www.virustotal.com/en/file/777ef...448289292/

1. Detection rate 46/54

2. Behavioural Information reports http requests that are highly suspicious for what is supposed to be an http flooder. The site is now offline so its hard to tell exactly what it was doing, but based on the file names being remotely accessed, it's clearly not just an http flooder

3. His Youtube demo used a Python script, where as the file he provided was a .NET application. If this was a py2exe application (which is a plausible reason it's an exe instead of .py) then VT would have shown some file creation activity under Behavioural Information, which it does not. (it would create DLL's and what not to run the the script). So major discrepancy between the video and the application.

[+] 1 user Likes The Real Slim Shady's post
Reply

RE: BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT #14
(11-23-2015, 03:50 PM)The Real Slim Shady Wrote: https://www.virustotal.com/en/file/777ef...448289292/

1. Detection rate 46/54

2. Behavioural Information reports http requests that are highly suspicious for what is supposed to be an http flooder. The site is now offline so its hard to tell exactly what it was doing, but based on the file names being remotely accessed, it's clearly not just an http flooder

3. His Youtube demo used a Python script, where as the file he provided was a .NET application. If this was a py2exe application (which is a plausible reason it's an exe instead of .py) then VT would have shown some file creation activity under Behavioural Information, which it does not. (it would create DLL's and what not to run the the script). So major discrepancy between the video and the application.

Well that's convincing information.
Thanks for the writeup @The Real Slim Shady

Reply

RE: BoosTHTTPv3.0 Mega PowerFul FasT Pr0xy | SockeT #15
(11-23-2015, 03:50 PM)The Real Slim Shady Wrote: https://www.virustotal.com/en/file/777ef...448289292/

1. Detection rate 46/54

2. Behavioural Information reports http requests that are highly suspicious for what is supposed to be an http flooder. The site is now offline so its hard to tell exactly what it was doing, but based on the file names being remotely accessed, it's clearly not just an http flooder

3. His Youtube demo used a Python script, where as the file he provided was a .NET application. If this was a py2exe application (which is a plausible reason it's an exe instead of .py) then VT would have shown some file creation activity under Behavioural Information, which it does not. (it would create DLL's and what not to run the the script). So major discrepancy between the video and the application.

Thx very much for doing this, I have redacted download links and banned the user.
---
Click here to get started with Linux!

If I helped you, please +rep me, apparently we've started over on Rep and I'd like to break 100 again...

Inori Wrote: got clickbaited by roger

Reply







Users browsing this thread: 1 Guest(s)