Chapter
How a Researcher Used an Internet Botnet to Scan the Web
A researcher created a program that would scan and find unprotected systems, then upload the program to the systems to work scanning for more systems. With billions of probes and data points collected from the Karna botnet, the researcher analyzed the data to make sense of it before shutting down the botnet.
Clips
A researcher created a botnet to scan unprotected systems on the internet and find more systems to scan.
03:37 - 06:17 (02:40)
Summary
A researcher created a botnet to scan unprotected systems on the internet and find more systems to scan. The botnet finished scanning the internet for all devices running townnet with the default password, but didn't install the program on any industrial control systems.
ChapterHow a Researcher Used an Internet Botnet to Scan the Web
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A security researcher decided to use a botnet to perform a detailed scan of the internet, pinging every IP and checking the top 100 ports, which required a lot of storage and time to complete the scan by doing over 60 billion probes.
06:17 - 07:29 (01:12)
Summary
A security researcher decided to use a botnet to perform a detailed scan of the internet, pinging every IP and checking the top 100 ports, which required a lot of storage and time to complete the scan by doing over 60 billion probes.
ChapterHow a Researcher Used an Internet Botnet to Scan the Web
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
After collecting data for six weeks, a researcher shut down the Karna botnet and discovered the existence of another botnet on the same computers.
07:29 - 10:41 (03:11)
Summary
After collecting data for six weeks, a researcher shut down the Karna botnet and discovered the existence of another botnet on the same computers.
ChapterHow a Researcher Used an Internet Botnet to Scan the Web
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A security researcher anonymously published a world map that reveals the locations of all devices infected by the Karna botnet, providing insight into the comprehensive approach hackers took to spread their malware.
10:41 - 12:21 (01:39)
Summary
A security researcher anonymously published a world map that reveals the locations of all devices infected by the Karna botnet, providing insight into the comprehensive approach hackers took to spread their malware.