Professional Documents
Culture Documents
Make Your Own Bot Network
Make Your Own Bot Network
You have probably have heard the famous technique used by threat actors in which they hack the computers
and make their own network of hacked computers to hack another computers outside the existing network.
What if the attacker want to take control of the network of attacked computers. My be hundred of computers at
a time? Probably as an attacker you need to manage your each victim differently as every system behaves
differently. But what if the attacker has some panel where he can manage all his victims in one click? This is
what our today’s tool motive is all about.
Today we are gonna combine all your victim’s in a single panel. The tool named blacknet is one of the great
tools that have made their presence in the market. This tool lets you create your own database of victim’s
information on your chosen server and allows you to maintain your victim’s record. The tool is written in PHP
and provides more features to the attacker. So lets dive into the tool and see whats inside it.
We will test the tool on Kali Linux 20201.b 5.5.0 64-bit . However to build exe, we later need windows
libraries and so will test it on Windows 10 build version 1909.
Make sure you have Apache (web server) installed on your current system.
Make sure phpMyAdmin is enabled on your server.
We have to configure the LAMP (Linux, Apache, Mysql, Phpmyadmin) to make this tool run
Make sure that apche2 is installed in your system. If not install it by apt-get install apache2.(It comes
prebuilt in 2020 version)
Make sure that mysql is installed in your system, if not, download package from the internet and install it
from there
Then install phpMyAdmin by typing the command apt-get install phpMyAdmin and configure it with
apache2.
Suggested packages:
Recommended packages:
php-mcrypt
Start your apache web server with /etc/init.d/apache2 start. Type 127.0.0.1/phpmyadmin.
If it still shows the 404 error, then edit your apache2.conf file with apache config file of phpMyAdmin.
To do this, type nano /etc/apache2.conf and then edit the phpadmin apache config file in the end by
typing Include /etc/phpMyAdmin/apache.conf and then save and exit from the file.
remote: Total 350 (delta 0), reused 0 (delta 0), pack-reused 350
Extracting install.php OK
Extracting login.php OK
Extracting logout.php OK
Extracting receive.php OK
Extracting sendcommand.php OK
Extracting session.php OK
Creating asset OK
Creating asset/css OK
Extracting asset/css/sb-admin.css OK
Extracting asset/css/sb-admin.min.css OK
Creating asset/js OK
Creating asset/js/demo OK
Extracting asset/js/demo/chart-area-demo.js OK
Extracting asset/js/demo/chart-bar-demo.js OK
Extracting asset/js/demo/chart-pie-demo.js OK
Extracting asset/js/demo/datatables-demo.js OK
Extracting asset/js/sb-admin.js OK
Extracting asset/js/sb-admin.min.js OK
====SNIP=======
Extracting changePassword.php OK
Extracting connection.php OK
Extracting favico.png OK
Extracting getCommand.php OK
Extracting getcontery.php OK
Extracting index.php OK
All OK
After the database.php opens, replace the Database username , password and name to your username
password and database name.
Now all the required alterations and setup has done for the tool, now we can move forward to install the panel.
To install panel;
Restart your apache web server and go to 127.0.0.1/bnet/login.php. It has by default set username and
password as admin.
After logging in, you have entered into your panel
The vicitim where the script is running receives the message on its command line.
So you have following option in linux as: Print Simple Message for Client*
Open Webpage
Upload File
Simple DDOS Attack
Uninstall Client
Close Client
The developer of the tool has attached a builder that creates a malicious .exe file but the builder only works in
windows it needs visual basic files an libraries to compile the end malicious .exe file. So for this we will clone
the repo in the windows:
Upload File
DDOS Attack [ TCP,UDP,ARME,Slowloris ]
Open Webpage
Show MessageBox
Uninstall Client
Close Client
CONCLUSION:
This is the one of the good tool in the market which you can use to make full use of victim’s machine and
destroy it. If you want to make efficient use of victim’s machine and want more features. This tool is beneficial if
you want to attack the whole network as it allows you to control your victims just through a panel.
Contact https://www.exploitone.com/
MEXICO
538, Homero #303, Chapultepec Morales,
Mexico D.F (Distrito Federal) 11570
INDIA
Fifth Floor, HB Twin Tower
Netaji Subhash Place, Delhi NCR, 110034