3,910 bytes added
, 12:01, 23 November 2009
{{Infobox_Software
|name = psyBNC
|logo =
|caption =
|screenshot =
|developer = psychoid
|latest_release_version = 2.3.2-9
|latest_release_date = [[October 22]], [[2008]]
|programming language = [[C (programming language)|C]]
|operating_system = [[Unix-like]]
|genre = [[Bouncer (networking)|IRC bouncer]]
|license = [[GNU General Public License]]
|website = [http://www.psybnc.at/ www.psybnc.at]
}}
'''psyBNC''' is an [[Internet Relay Chat|IRC]] [[BNC (software)|network bouncer]] or BNC. ''psy'' is short for psychoid, the original creator of psyBNC. ''BNC'' is short for bouncer, a method of "bouncing" through a server to cloak your hostname.
psyBNC is a very easy to use BNC<ref>Ubuntu.com [http://help.ubuntu.com/community/psyBNC psyBNC documentation]; retrieved 14 September 2008.</ref><ref>[http://minivds.com/technology/faq/irc-psybnc.html Installing Psybnc IRC]</ref> and became popular (especially on FreeBSD<ref>Freshports [http://www.freshports.org/irc/psybnc/ irc/psyBNC]; retrieved 14 September 2008.</ref>) by gaining significance due to the unique way it worked. Unlike any other BNC software available at the time, psyBNC could stay connected to IRC, even when you detach your IRC client from the BNC. psyBNC was the first bouncer to support this feature. Today, most IRC bouncers have this feature.
Features include multiple users in one BNC; ability to change your vhost on the fly; scripting support (basic); logging; identd spoofing via [[oidentd]]<ref>http://www.psybnc.at/faq.html#q16</ref>; multi server support; and recently [[IPv6]] and [[Transport layer security|SSL]] support.<ref>psybnc.at [http://www.psybnc.at/about.html About psyBNC]; retrieved 14 September 2008.</ref> The software runs on [[Linux]], [[FreeBSD]], [[OpenBSD]], [[SunOS]], [[Solaris (operating system)|Solaris]] and with some modifications also on [[Microsoft Windows]].
Since 2008 psyBNC has four additional developers who go under the aliases of Arakis, Chaot, iceblox, and inFECT.<ref>psybnc.at [http://www.psybnc.at/index.html Next psyBNC Version will be released by a new Development Team.]; retrieved 14 September 2008.</ref>
== Malicious use ==
psyBNC running on a machine without the knowledge of the user may be a [[Backdoor (computing)|backdoor]] or [[Trojan horse (computing)|trojan]] into the machine or part of a [[Denial-of-service attack|Denial of Service (DOS) Attack]], [[Zombie network|Zombie Network]], or [[botnet]].<ref name=malicious_waterloo>IST [http://ist.uwaterloo.ca/security/vulnerable/20041123.note University of Waterloo: Information Systems and Technology security bulletin]; retrieved 14 September 2008.</ref><ref name=malicious_mailinglist>NPG [http://www.atm.tut.fi/list-archive/nanog/msg35354.html Mailing list posting documenting the use of psyBNC in botnets]; retrieved 14 September 2008.</ref><ref>[http://www.file.net/process/psybnc.exe.html psybnc.exe Windows process - What is it?]</ref><ref>Linux Magazine [http://www.linux-magazine.com/w3/issue/77/lsof.pdf Looking for intruders with lsof] April 2007, cover story</ref><ref>[http://www.informit.com/articles/article.aspx?p=348249&seqNum=2 informit: The Real THR34T KR3W: The Story of Hacker Connor Hansen]</ref><ref>[http://www.heise.de/english/newsticker/news/91048 heise: Angela Merkel's website was compromised]</ref>
==References==
{{reflist}}
* Google hacking for penetration testers, Johnny Long and Ed Skoudis, Page 272, ISBN 1931836361
* Securing IM and P2P applications for the enterprise, Paul L. Piccard and Marcus H. Sachs, Page 380, ISBN 1597490172
== External links ==
* [http://www.psybnc.at/ psyBNC Website]
* {{SourceForge|psybnc|psyBNC}}
* {{Ohloh|psybnc|psyBNC}}
* [http://www.freshports.org/irc/psybnc/ psyBNC on FreshPorts]
* [https://help.ubuntu.com/community/psyBNC psyBNC on Ubuntu Help]
* [http://www.honeynet.org/scans/scan28/sol/5/mirror/psyBNC.htm An Introduction to psyBNC 2.3.1]