Slijede razlike između dviju inačica stranice.
| Starije izmjene na obje strane Starija izmjena Novija izmjena | Starija izmjena | ||
| racfor_wiki:seminari2024:projekt_ddosia [2025/01/25 09:36] Orsag Mihael [Further development] | racfor_wiki:seminari2024:projekt_ddosia [2025/01/27 06:36] (trenutno) Orsag Mihael [Project DDoSia] | ||
|---|---|---|---|
| Redak 1: | Redak 1: | ||
| ====== Project DDoSia ====== | ====== Project DDoSia ====== | ||
| + | [[https:// | ||
| ===== Abstract ===== | ===== Abstract ===== | ||
| Redak 32: | Redak 33: | ||
| malicious actors to do this job instead, for a certain amount of money. Project | malicious actors to do this job instead, for a certain amount of money. Project | ||
| DDoSia is a bot software that takes an interesting, | DDoSia is a bot software that takes an interesting, | ||
| - | expanding its botnet by making the joining to the botnet entirely voluntary. | + | expanding its botnet by making the joining to the botnet entirely voluntary. | 
| + | |||
| + | {{: | ||
| + | |||
| + | Figure 1: Network structure of a botnet [6] | ||
| ===== Early versions ===== | ===== Early versions ===== | ||
| Redak 54: | Redak 59: | ||
| macOS and Windows. | macOS and Windows. | ||
| - | {{https:// | + | {{:racfor_wiki: | 
| - | |Messages in the Project DDoSia Telegram group regarding rewards}} | + | |
| - | Figure | + | Figure | 
| == Linux and macOS == | == Linux and macOS == | ||
| Redak 128: | Redak 132: | ||
| server, authentication is required. | server, authentication is required. | ||
| - | {{https:// | + | {{:racfor_wiki: | 
| - | Figure | + | Figure | 
| Additionally, | Additionally, | ||
| Redak 137: | Redak 141: | ||
| better protect it by keeping its IP address secret. | better protect it by keeping its IP address secret. | ||
| - | {{https:// | + | {{:racfor_wiki: | 
| |C&C server architecture of the newer version of Project DDoSia botnet.[2]}} | |C&C server architecture of the newer version of Project DDoSia botnet.[2]}} | ||
| - | Figure | + | Figure | 
| In April 2023 the number of users in the Project DDoSia telegram group rose to | In April 2023 the number of users in the Project DDoSia telegram group rose to | ||
| Redak 152: | Redak 156: | ||
| With its growing capabilities and resources, the Project DDoSia botnet has | With its growing capabilities and resources, the Project DDoSia botnet has | ||
| expanded the list of targets, adding and heavily targeting Finland and Italy | expanded the list of targets, adding and heavily targeting Finland and Italy | ||
| - | along Ukraine. The most prevalent targets are govorment | + | along Ukraine. The most prevalent targets are government | 
| by banking and transportation organizations. | by banking and transportation organizations. | ||
| - | {{https:// | + | {{:racfor_wiki: | 
| |A map of targeted countries by the Project DDoSia botnet in 2024.[5]}} | |A map of targeted countries by the Project DDoSia botnet in 2024.[5]}} | ||
| - | Figure | + | Figure | 
| - | ==== Conclusion ==== | + | ===== Conclusion | 
| Project DDoSia is a new approach to creating malicious botnets. With the | Project DDoSia is a new approach to creating malicious botnets. With the | ||
| Redak 175: | Redak 179: | ||
| ==== Literature ==== | ==== Literature ==== | ||
| - | [1] [[https:// | + | [1] [[https:// | 
| + | |||
| + | [2] [[https:// | ||
| - | [2] [[https://decoded.avast.io/martinchlumecky/ | + | [3] [[https://socradar.io/what-is-ddosia-project/ |SOCRadar: " | 
| - | [3] [[https://socradar.io/what-is-ddosia-project/ |SOCRadar, What is DDoSia Project?]]. Accessed: 17.1.2025. | + | [4] [[https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/ |Amaury G., Charles M. and Sekoia TDR: " | 
| - | [4] [[https:// | + | [5] [[https:// | 
| - | [5] [[https:// | + | [6] Mahmoud, Muhammad, Manjinder Nir, and Ashraf Matrawy. "A survey on botnet architectures, detection |