tacotime
Legendary
Offline
Activity: 1484
Merit: 1005
|
|
March 17, 2013, 07:27:02 PM |
|
Just check if any system files have injected any different byte arrays into the systems memory. Checking if anything has been written to the VirtualMemory or any space has been allocated in the memory.
If it were that easy, anti-virus software companies would be out of a job pretty quickly.
|
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
|
|
|
Simran
|
|
March 17, 2013, 07:30:23 PM |
|
Just check if any system files have injected any different byte arrays into the systems memory. Checking if anything has been written to the VirtualMemory or any space has been allocated in the memory.
If it were that easy, anti-virus software companies would be out of a job pretty quickly. It is easy, just not everyone knows what exactly to do :trlf:
|
*Image Removed* Donate LTC: LRgbgTa3XNQSEUhnwC6Ye2vjiCV2CNRpib Donate BTC: 1AGP6xPTRvsAVhsRsBX13NUH6p6LJjyeiA
|
|
|
tacotime
Legendary
Offline
Activity: 1484
Merit: 1005
|
|
March 17, 2013, 07:38:03 PM |
|
It is easy, just not everyone knows what exactly to do :trlf:
There are a lot of ways to get around WriteProcessMemory or OpenProcess call monitoring if that's what you're talking about. It's really easy to write straight binary code to memory from a C program from overflow or other simple calls that will never be detected that way.
|
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
|
|
|
mr_random
Legendary
Offline
Activity: 1344
Merit: 1001
|
|
March 17, 2013, 07:39:13 PM |
|
People keep forgetting there are legal consequences to engaging in this activity. I can't speak for everyone's home country, but in mine even offering a bounty for a malicious cyber crime that would damage businesses and individuals constitutes criminal activity (Computer Misuse Act, amongst others).
|
|
|
|
Simran
|
|
March 17, 2013, 07:40:42 PM |
|
It is easy, just not everyone knows what exactly to do :trlf:
There are a lot of ways to get around WriteProcessMemory or OpenProcess call monitoring if that's what you're talking about. It's really easy to write straight binary code to memory from a C program from overflow or other simple calls that will never be detected that way. :trlf: :trlf: :trlf: :trlf: not saying anymoar :trlf: :trlf: :trlf:
|
*Image Removed* Donate LTC: LRgbgTa3XNQSEUhnwC6Ye2vjiCV2CNRpib Donate BTC: 1AGP6xPTRvsAVhsRsBX13NUH6p6LJjyeiA
|
|
|
matauc12
|
|
March 17, 2013, 08:57:22 PM |
|
You buy a "botkiller". It kills all the other peoples infected file besides yours so the zombie is all yours.
That I would trust even less than the botnet computers themselves. That would need to be something you yourself programmed, and even then it'd be difficult to tell what other backends were and weren't installed on the compromised computer. Just check if any system files have injected any different byte arrays into the systems memory. Checking if anything has been written to the VirtualMemory or any space has been allocated in the memory. OMG THAT EASY?!?!?..... See how long your botnet lasts then. Its a fallacy to think something that's easy isn't already done.
|
|
|
|
mr_random
Legendary
Offline
Activity: 1344
Merit: 1001
|
|
March 17, 2013, 09:41:19 PM |
|
People keep forgetting there are legal consequences to engaging in this activity. I can't speak for everyone's home country, but in mine even offering a bounty for a malicious cyber crime that would damage businesses and individuals constitutes criminal activity (Computer Misuse Act, amongst others).
And very, very few people get caught, so no one cares. Because no-one from the Anonymous hacking group got busted right? Or the other groups. OP would already be implicated just by offering a bounty but he is too retarded to realise that.
|
|
|
|
Barnacle_Ed
|
|
March 17, 2013, 10:10:07 PM |
|
Successful troll is successful
|
|
|
|
efx
|
|
March 17, 2013, 10:16:27 PM |
|
Perhaps. I especially liked the crazy_rabbit troll. Make sure you collect from them both, rabbit. Also, coinhorder went to town on that calulation. What do you mean by the coins 'disappear', Simran?
|
|
|
|
Hfertig
|
|
March 17, 2013, 10:22:54 PM |
|
I think this thread is a waste of time and efforts. Litecoin will fail anyway.... no need for an attack.
|
|
|
|
tacotime
Legendary
Offline
Activity: 1484
Merit: 1005
|
|
March 17, 2013, 10:27:21 PM |
|
I think this thread is a waste of time and efforts. Litecoin will fail anyway.... no need for an attack.
I doubt it given the ever increasing $10 million USD market cap.
|
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
|
|
|
efx
|
|
March 17, 2013, 10:28:35 PM |
|
^^ Yeah right, that's nice
|
|
|
|
efx
|
|
March 17, 2013, 10:30:25 PM |
|
No no...wait... Long term, both bitcoin and litecoin will die, mostly. Possibly sooner than we expect.
|
|
|
|
BTCOnetime
Member
Offline
Activity: 64
Merit: 10
|
|
March 18, 2013, 05:20:38 AM |
|
Why do you say they will both fail sooner than we think?
|
|
|
|
drawingthesun
Legendary
Offline
Activity: 1176
Merit: 1015
|
|
March 18, 2013, 05:54:45 AM |
|
To gain 51% of a 2,814,369Kh LTC network, you would need 1,435,328.19 Khs
You actually underestimated the hash power needed to take control of a 2,814,369Kh LTC network. You will be adding power because all those nodes still exist, so you will actually need to add 2,814,369Kh plus a little more to gain. Like this: 2,814,369 + 2,814,369 + 1000 to get a good 51% going. This means you need to add 2,815,369 Kh and you will have control over a network with the eventual speed of 5,629,738 Kh So it would cost even more.
|
|
|
|
lophie
|
|
March 18, 2013, 01:43:12 PM |
|
I will add 500$ to the bounty. Not rich just damn sure this is not possible. I will handsomely pay if proven otherwise.
|
Will take me a while to climb up again, But where is a will, there is a way...
|
|
|
BitcoinINV
|
|
March 18, 2013, 01:55:20 PM |
|
First I did not read the whole post so don't hate me if I say something that has already been covered. What has litecoin done to you? Why not put your resources into something useful? Who cares what the market cap is? People sell dirt and rocks it's the world we live in.
|
|
|
|
lophie
|
|
March 18, 2013, 02:05:57 PM |
|
First I did not read the whole post so don't hate me if I say something that has already been covered. What has litecoin done to you? Why not put your resources into something useful? Who cares what the market cap is? People sell dirt and rocks it's the world we live in. First, GO READ THE WHOLE POST. The join the conversation.
|
Will take me a while to climb up again, But where is a will, there is a way...
|
|
|
BitcoinINV
|
|
March 18, 2013, 02:11:44 PM |
|
First I did not read the whole post so don't hate me if I say something that has already been covered. What has litecoin done to you? Why not put your resources into something useful? Who cares what the market cap is? People sell dirt and rocks it's the world we live in. First, GO READ THE WHOLE POST. The join the conversation. NO NEED TO SHOUT, your douchebaggery is not needed, um-kay ok thanks now bye bye
|
|
|
|
FixDragonsTalePlease
Newbie
Offline
Activity: 42
Merit: 0
|
|
March 18, 2013, 02:16:48 PM |
|
$4000 is so totally $400,000 you are right
You totally have enough money to perform this attack...
You should fire your Low Orbit Ion Cannon at port 80 or whatever dem cool kids do...
"Insert extreme sarcasms"
|
|
|
|
|