ZeroC2 vs Mirai infrastructure - tcpfin-dev/terylene GitHub Wiki
Difference between Terylene and Mirai botnet
Terylene | Mirai botnet |
---|---|
spread through local network | cant spread through local network |
faster worm | slower worm |
able to mitigate | unable to mitigate |
stream socket attacks | raw socket attacks |
targets almost all linux distro | targets all linux distro |
smarter Ddos techniques | old school ddos techniques |
only targets one architecture | targets all architecture |
Terylene vs Mirai Summary
Mirai is able to target a wide range of IOT devices, however terylene is able to target the architecture that it is built in (because golang doesnt support cross compilation with C) . On the other hand Terylene has faster worm spreading rate than mirai, better traffic control, and smarter Ddos techniques. Terylene is the best botnet to infect powerful servers, while Mirai can infect all types of IOTs.
Difference between ZeroC2 and Mirai C2
ZeroC2 | Mirai C2 |
---|---|
Decentralized | Centralized |
Fast flux and dynamic ip | Static ip |
High Fault tolerance | little fault tolerance |
botnet authentication | No authentication |
fast messaging library | builtin net libraries |
ZeroC2 vs Mirai C2 Summary
ZeroC2 incorporates advanced features like "Mother Priority" for redundancy, "Backoff and Retry" for resilience, and "Transfer or Migration" for evasion. These features are tailored for the efficient management of botnets. ZeroC2 allows a decentralized infrastructure to avoid detection and takedown efforts, while legitimate C2 servers are typically centralized and well-managed. ZeroC2 also secret messages to verify other ZeroC2 servers, preventing migration to honeypots or invalid locations, Legitimate C2 servers rely on standard authentication and verification practices for authorized access.