Features
Technical Details
- DETAILCoded in Lazarus (Pascal)
- DETAILCode is fully relocatable (Shellcode)
- DETAILUses custom CRC32 API loader
- DETAILUses BeaEngine Disassembler for x86 and x64
- DETAILUses named pipes for inter-process communication
- DETAILMultpiple layers of encryption and compression
- DETAILGlobal Ring 3 rootkit
- DETAILNo own process
- DETAILFully Unicode
- DETAILNo dependencies (Only standard system DLLs)
- DETAILMultiple Anti-Debug methods
- DETAILUnique Server->Bot traffic encryption
- DETAILAnti bot installation
Features
- FEATUREInternet Explorer Formgrabber
- FEATUREMozilla FireFox Formgrabber
- FEATUREGoogle Chrome Formgrabber
- FEATURESPDY Grabbing
- FEATUREFTP and POP3 Grabber
- FEATURESlowLoris DDOS
- FEATURESlowPost DDOS
- FEATUREGET Flood
- FEATUREUDP DDOS
- FEATUREUpdate and Download System
- FEATUREMD5 Verified Update and Download System
- FEATUREReverse Socks 5
- FEATUREBrowse URL (Visible)
- FEATUREBrowse URL (Hidden)
Using commands
When you have bots on your panel, you want to start using commands. To issue commands, you go to the Commands Page. On the left side you can see a widget with a dropdown list. In the dropdown list you can see which commands Ghost HTTP bot supports. Every command needs a parameter, which will be explained later. The limit box is for specifying how many bots that should execute your command (0 = unlimited) and with the GUID box you can specify one unique bot to execute the command by inserting it's GUID.
Command parameters
Every commands has a different parameter. All commands are listed below and if you hover over the commands, the parameters and explanation will be shown.
Uninstall
Down & Exec
Down & Exec MD5
Slowloris Ddos
UDP Ddos
SlowPost Ddos
Update
Update MD5
Get Flood
Rev Socks
Browse Url
Browse Url Hidden
Down & Exec MD5 RC4
Uninstall
Down & Exec
Down & Exec MD5
Slowloris Ddos
UDP Ddos
SlowPost Ddos
Update
Update MD5
Get Flood
Rev Socks
Browse Url
Browse Url Hidden
Down & Exec MD5 RC4
Using the Reverse Socks
To use the reverse proxy, you will need to open up a port if you are behind a router. First open up the reverse proxy client and press ‘Listen’. The client will now listen on the default ports 8080 and 8081. Now that you have the client listening, you will need to check if you have your port open. You can check that on CanYouSeeMe.org. If it does not tell you that it had success seeing your service on port 8080, your ports are not forwarded and you will need to do that before being able to use the reverse proxy. If canyouseeme.org tells it can see your service, you are ready to go. Go to the command tab on your panel and use the reverse socks command to get a connection. Don't forget that you need to fill in your IP address with port 8080, limit 1 and the GUID of the bot which’ IP you want. After that, the bot will connect to you and you can use the reverse socks 5 proxy on 127.0.0.1:8081.
is only $250 and there will be no discount given, even if you don't want certain functions
Skype : botnet123
yahoo: botnetvietnam
0 comments:
Post a Comment