请选择 进入手机版 | 继续访问电脑版

网络科技

    今日:49| 主题:284412
收藏本版
互联网、科技极客的综合动态。

[其他] Here are the 61 passwords that powered the Mirai IoT botnet

[复制链接]
不念不忘少年蓝 发表于 2016-10-4 09:18:14
149 2
Default usernames and passwords have always been a massive problem in IT. These days, the consumer technology that envelops the Internet of Things (IoT) has only made the problem larger.
  Default credentials, which are ignored or too difficult for some people to change, behind the development of    a botnet that took part in the largest DDoS attack on record.  
  The usernames and passwords below were used to enable the Mirai botnet, which is powered by IoT technology. The botnet hit Brian Krebs with traffic topping out at 620Gbps, but it's also been linked to a DDoS against OVH (799Gbps).
  Mirai scans for telnet, and then uses the credentials below in an attempt to brute-force access to the device – which could be a camera, DVR, router, or other connected hardware.
  The passwords come form the botnet's source code, which was released by the author last week.    Note:One duplicate password from the source code was removed in the list below.  
  The botnet required at a minimum, two servers. However, Mirai's author said he hosted the botnet with two VPS accounts, one server to act as a C&C, and three servers to add additional load balancing.
  At peak, the Mirai had nearly 400,000 devices connected to it from telnet scanning alone. After the attack on Brian Krebs, this shrank down to about 300,000, due to ISPs attempting to correct the easily obtained access.
  Along with releasing the botnet source code, the author of Mirai also released detailed instructions for configuration and set-up.
黄丹 发表于 2016-10-4 10:28:20
很精典,谢谢! 难得的好贴
回复 支持 反对

使用道具 举报

那什么跟什么 发表于 2016-10-11 14:12:30
不念不忘少年蓝很有艺术范!
回复 支持 反对

使用道具 举报

我要投稿

推荐阅读


回页顶回复上一篇下一篇回列表
手机版/c.CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 | 粤公网安备 44010402000842号 )

© 2001-2017 Comsenz Inc.

返回顶部 返回列表