24

Topics to be covered

  • Upload
    adonica

  • View
    47

  • Download
    0

Embed Size (px)

DESCRIPTION

Topics to be covered. 1. What are bots,botnet ?. 2.How does it work?. 3.Types of botnets . 4.Prevention of botnet . What are bots,botnet ?. Bot a small program to remotely control a computer Botnet is a network of zombies, i.e. compromised computers under control of an attacker. - PowerPoint PPT Presentation

Citation preview

Page 1: Topics  to be covered
Page 2: Topics  to be covered

Topics to be covered

1. What are bots,botnet?

2.How does it work?

4.Prevention of botnet.

3.Types of botnets.

Page 3: Topics  to be covered

Bot a small program to remotely control a computer

Botnet is a network of zombies, i.e. compromised computers under control of an attacker.

What are bots,botnet?

Page 4: Topics  to be covered

How does it work?

Page 5: Topics  to be covered

In following picture [1] shows the life-cycle of a botnet infection and the contact with the botmaster:

  Infection strategies used by the masters are often seen when examining other malware such as self-replicating worms, e-mail viruses, etc. but also can be spread by making a victim execute some form of malicious code on his machine. Many email attachments are simply these executable files.

     

 

Page 6: Topics  to be covered

 

The next step taken by a new bot is to contact a DNS server for the resolving of the DNS name of the IRC server (the IRC server’s name is given in the executable and a DNS query is made to acquire the server’s IP address). This step allows the master to retain control of the net also if the IP address associated with the DNS name of the IRC server gets black-listed.

Page 7: Topics  to be covered

The next step taken by a new bot is to contact a DNS server for the resolving of the DNS name of the IRC server (the IRC server’s name is given in the executable and a DNS query is made to acquire the server’s IP address). This step allows the master to retain control of the net also if the IP address associated with the DNS name of the IRC server gets black-listed.

Page 8: Topics  to be covered

The fact that IRC channels allow several forms of communication as well as data dissemination and that many open-source implementations are available make this protocol just suitable for botmasters.

  As the C&C channel is also

specified in the binary, the bot can now establish an IRC connection with the server and join the given channel. For this purpose, three steps of authentication are required: first of all the bot authenticates itself to the server with the PASS message, then it also has to authenticate itself with a password, to the master in order to join the channel.

Page 9: Topics  to be covered

Lastly the botmaster also needs to authenticate himself to the bot before being able to send any command. The first two aim to keep outsiders away from the C&C channel, and the last one prevents the bots from being overtaken by other masters.

 

Page 10: Topics  to be covered

  When the join has successfully occurred, the

bot executes the channel’s topic, which contains the default commands that every bot has to execute. Often it occurs that all bots on the channel are able to hear every exchanged message and this characteristic is used on this paper for the acquisition of insider information. However, sometimes broadcasting is not allowed to prevent saturation.

 

Page 11: Topics  to be covered

3 things are required for it & they are:

bot:- a small program that can remotely perform certain functions.

How to make botnet?

Page 12: Topics  to be covered

C&c server

Page 13: Topics  to be covered

Network of zombies

Page 14: Topics  to be covered

Where to find a botFind a script on the Internet & purchase a ready-to-go bot .

Prices vary from $5 to $1000 depending on the bot functionality.

Write yourself .

Step1:

Page 15: Topics  to be covered

C&C serverC&C server is simply a powerful computer which will give you direct access to zombies, or if needed will store stolen data. For example, to install IRC server

step2:

Page 16: Topics  to be covered

Dedicated computer with installed software (fairly legal).

Buy a domain, since it should be set up as a web server Hosting - to make the server accessible from the Internet, it should be hosted by a hosting company.

Page 17: Topics  to be covered

Creating zombiesPurchase/rent a network of zombies & compromise computers yourself.

Using software packages such as Mpack, Icepack and WebAttacker,using your brains.

Step3:

Page 18: Topics  to be covered

  Agobot/Phatbot/Forbot/XtremBot:-

This is probably the best known bot. Currently, the AV vendor Sophos lists more than 500 known different versions of Agobot (Sophos virus analyses) and this number is steadily increasing. The bot itself is written in C++ with cross-platform capabilities and the source code is put under the GPL.

.

Types of botnet

Page 19: Topics  to be covered

mIRC-based Bots - GT-Bots:-

We subsume all mIRC-based bots as GT-bots, since there are so many different versions of them that it is hard to get an overview of all forks. mIRC itself is a popular IRC client for Windows. GT is an abbreviation for Global Threat and this is the common name used for all mIRC-scripted bots.

Page 20: Topics  to be covered

Kaiten:-

This bot lacks a spreader too, and is also written for Unix/Linux systems. The weak user authentication makes it very easy to hijack a botnet running with kaiten. The bot itself consists of just one file.

Page 21: Topics  to be covered

Q8 Bots:-

Q8bot is a very small bot, consisting of only 926 lines of C-code. And it has one additional noteworthiness: It's written for Unix/Linux systems. It implements all common features of a bot: Dynamic updating via HTTP-downloads, various DDoS- attacks (e.g. SYN-flood and UDP-flood), execution of arbitrary commands, and many more.

Page 22: Topics  to be covered

Often botnets are used for Distributed Denial-of-Service (ddos)attack. A DDoS attack is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consumingthe bandwidth of the victim network.

Uses of botnet

Page 23: Topics  to be covered

Sniffing Traffic:-

Bots can also use a packet sniffer to watch for interesting clear-text data passing by a compromised machine. The sniffers are mostly used to retrieve sensitive information like usernames and passwords. But the sniffed data can also contain other interesting information.

Page 24: Topics  to be covered

Software defaults should be the most secure settings, not the least secure & implement intrusion prevention systems. Implement spam filtering (w/CBL) and antivirus.

Implement organizational firewall and content filtering.

Blackhole botnet controllers and phishing websites upon verification & send regular notifications to downstream customers of detected issues.

Implement detection and filtering mechanisms where/when feasible.

Botnet prevention