20
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Embed Size (px)

Citation preview

Page 1: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

PROJECT IN COMPUTER SECURITYMONITORING BOTNETS FROM WITHINFINAL PRESENTATION – SPRING 2012

Students: Shir Degani, Yuval DeganiSupervisor: Amichai Shulman

Page 2: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Background

Botnets, large networks of compromised computers,form the main source of application layer attacksagainst web servers as of today.

 A Botnet is a network built by individuallyinfecting (or “recruiting”) computers via variousmethods, such as infected websites, downloadedmalicious code or abusive use of server-sideapplication vulnerabilities.

Page 3: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Aims and goals

One of the important aspects of investigating thisphenomenon is to be able to understand the trafficthat a bot generates upon command from the

botnetcommander. Isolating bot traffic from regular

trafficwill allow a computer security researcher to

developsoftware for identifying an already infected

computerand to block this abusive traffic.

Page 4: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Objectives

Publish a website application with easy and known vulnerabilities, that will also be maintained and filled with false but real-looking content.

Join Botnets (if not by accident, then by force). Accumulate and analyze incoming and outgoing

traffic over time.Isolate and classify bot traffic.

Produce a detailed report of the traffic recorded: volume, duration, targets, type of abusive activities, and so on.

Recognize and generalize patterns of traffic.

Page 5: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Accomplishments

Collected long term IRC traffic from various botnets for analysis.

Analyzed IRC botnet traffic characteristics and botnet capabilities.

Researched many sources of malicious PHP code. Produced a detailed report on the analyzed traffic

and code. Created a set of tools for the automation of

infection and research of PHP IRC botnet code. Published a detailed guide on how to research

further scripts and use the tools provided.

Page 6: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Methodology

Publish a website application on “sandbox” machine.

Use provided lists of suspicious URLs to try and recognize active botnets

Use a different machine to collect IRC traffic on the botnets found.

Analyze the traffic logs collected. Produced a detailed and informative

report on each botnet.

Page 7: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Setup

Machines on Amazon EC2: Isolated “sandbox” machine running a web

server: Windows 2008 R2. Wordpress with a blog full of content. Security policy allows only web and IRC traffic. Wireshark running at all times to log packets. mIRC for monitoring chat room activity on the

relevant rooms and server. Machine is saved as a snapshot for restore if

needed. Separate machine for monitoring.

Page 8: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Set of automation tools

While working, we’ve noticed that most of the time is spent on meticulous and rigorous tasks for inspecting URLs and looking for active botnets.

This led us to try and automate some of the process, and resulted in a set of tools that reduces most of the overhead that URL inspection requires.

Page 9: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Tool #1: URL downloader

Targets the repetitive task of checking the validity of a list of suspicious URLs, and downloading them for further use.

Algorithm: Try different variations on each URL with a

few frequent suffixes. Number each script that was successfully

downloaded and add the .php extension.

Page 10: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Tool #2: IRC traffic sniffer

Targets the time consuming task of running a suspicious script and checking whether it actuates an active botnet.

Algorithm:For each PHP file in a specified folder: Start a Internet Explorer process. Copy the PHP file to a provided runnable web published folder. Start a background job for collecting all TCP packets. Run the PHP file in the Internet Explorer process for a limited amount of

time (timeout parameter provided). Kill the Internet Explorer and other PHP processes. Stop collecting packets. Analyze the packets and look for the following IRC commands:

PASS <string>, for password of the destination server (destination IP and TCP port on the packet).

JOIN #<string> <string>, for joining an IRC channel and the channel password. Print and add the sniffed info to a file that is named according to the PHP

file for further use.

Page 11: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Tool #2: IRC traffic sniffer

Page 12: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Results & Conclusions

Most of the activity on the active botnets involves scanning for vulnerable websites and trying to infect them.

All vulnerabilities that are used are well known and documented bugs in WordPress extensions.

Although they are known, a great number of scanning results appear to be vulnerable – users doesn’t care for updates enough.

Real attacks were rare in the data collected A notable DoS attack – UDP flood was seen. Passing of Credit Card numbers and identities were

noted a few times.

Page 13: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Some Visual Demonstrations

Page 14: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

UDP flood

Page 15: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Complex network of bots and managers

Page 16: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Timeline example

Page 17: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Backdoor example

Page 18: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Future work

The final report contains a full guide on how to inspect and analyze IRC botnets: Complete methodology guide. A list of further investigation directions. A user manual for the automation tools.

All of the following provide a big opportunity for future teams to get started very quickly and skip the initial non-productive phases.

Page 19: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

Summary

Our research shows that there is a whole underground culture of Indonesian sourced botnets that is very much alive and active.

Most of the activity on these botnets is expanding its army of bots, creating a large enough net of abused servers that can be lucrative for their manager.

PHP code allows endless possibilities for hijacking and abusing webservers.

Page 20: PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman

The End.