Closed

Network Security Testing (Automated/Bot)

This project encapsulates the successful completion of a Network Security Bot, the bot should be completed and demonstrated to be fully functionable and stable before purchase; the produced source is to be unique and all copyright of source will belong to us.

The bot should be able to perform the following:

Access a C&C Server (PERHAPS through the IRC protocol)

Will allow a system information command, detailing which operating system, as well as specifications of the sysem.

Execute Password 'Stealing' Commands (IE/Firefox)

Execute Product/CD Key Stealing Commands

Enable/Disable a keylogging command

Infect any attached USB drive/s

Infect any possible network resource/s through as many methods as possible (HTTP/RAR/MSN/AIM/Skype, etc)

Offer an authentication process (Login/Logout)

Offer an update/remove function (To obtain new binary/Remove the bot)

Emulate a Denial of Service (DoS) attack on the chosen 'target IP' through at least 2 protocols:

TCP/UDP

The bot should be able to connect via the chosen protocol to the configured C&C server efficiently. Meaning no dropped connections after any of the above commands are executed by the controller.

We understand that many of these 'bot sources' are released in the wild (and questionable) corners of the internet, we will not accept any of these public sources for the following reasons:

The malicious and 'detected' signatures applied to these sources - Our source requires that the bot remains 'Fully UnDetected' during scan/runtime of the bot's compiled executable.

The instability of such sources - Many of these sources are unstable when executing some of the simplest of commands, the bot will be deemed incomplete if instability is shown during demonstrations/on-hand testing of the produced bot.

The bot structure - Alot of the bot sources released are blatant copies of predecessors, resulting in a very unoriginal 'strain'; this is not what we are looking for.

The security bot should first be demonstrated before any payment is made.

The compilable source will then be exchanged.

A on-hands testing period will then ensue testing the bot for stability.

If there are any signs of the bot being incomplete - completion will be requested.

This bot is to be used in controlled conditions (legal) to demonstrate the security vulnerabilities currently existant in Windows Systems. The bot will be demonstrated to audiences throughout Europe, programming credit will be given (if requested).

Skills: C Programming, Computer Security

See more: what is network programming, what is computer programming used for, what is computer programming, what is a function in computer programming, structure detailing, runtime computer, programming irc, first computer programming, drive legal, dos programming, computer systems programming, computer programming service, computer programming information, computer network programming, c# network programming, binary target, applied systems, what is internet security, network programming in c, c network programming, we security, vulnerabilities, testing\ , testing c, testing +

About the Employer:
( 0 reviews ) NA, United States

Project ID: #594504

2 freelancers are bidding on average $2550 for this job

infyagent

Hi, Our experts can do this project. Check your PM to get to know more about our profile. Regards, InfyAgent

$1800 USD in 30 days
(1 Review)
3.8
SecurityExperts

visit our website for more info [url removed, login to view] For more precise quote, please fill our service request [url removed, login to view] How are we different from competitors? 1. Our projects do not g More

$5000 USD in 4 days
(0 Reviews)
0.0
rajan2785

hello sir may i do it for you.

$100 USD in 2 days
(0 Reviews)
0.0