Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Do anyone know how fas flux server was made and how it work??
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Do anyone know how fas flux server was made and how it work??

Hello guys I got some questions here...

how the fas flux server actually works what are make it hidden from the source IP of the server,
what kind of technique the setup does. I am really interested in networking security and what is needed to have to do a private fasflux server.

I know this is kind of illegal to ask but my curiosity ended here looking for a piece of knowledge for educational purposes. dose them have a source of back door server and then using the IP of the backdoored server and acting it the source come from there.

how does actually it works.. if anyone knows about this I really want to learn and give reward who know about it. I'm just a server setup enthusiastic nothing more nothing less just a human with curiosity that plays on his mind.

asking it all the way I got becos I google a lot seems can't find the answer of it things getting complicated and harder to understand it.

P/S: any Linux server administrator can tech me here I will paid you handsomely for a decent knowledge...

knowledge is powerful you can become someone special and different from others.

Comments

    1. What?
    2. Welcome to LET.
  • DPDP Administrator, The Domain Guy

    @Talistech said:
    1. What?
    2. Welcome to LET.

    1. Congratulations on your first post.
  • OP means fast flux, i.e. malware and phishing delivery. This should be closed since LET is white hat.

  • to be honest. im laugh at my self to read your guys comment its like its nothing guys I just want to know how to do it and how they do it. it make me interested want to learn more about it

  • SGrafSGraf Member, Patron Provider
    Thanked by 1pike
  • OP just needs to keep an eye on some of the malware analysis blogs, they usually contain a good amount of detail, links to decompiled or leaked malware source code, and everything else that they might need to learn about such stuff.

  • HostSlickHostSlick Member, Patron Provider

    Are we on HackForums now?

  • jarjar Patron Provider, Top Host, Veteran

    I love the complexity.

    Normal botnet: Every compromised host used.

    This botnet: Every compromised host used, but slightly different.

    Got ourselves some revolutionary stuff there.

    Thanked by 1alanbeta
  • callin it now. Another tinyW alt

Sign In or Register to comment.