SlideShare uma empresa Scribd logo
1 de 15
Overview
 What is a BotNet?
 Internet Relay Chat
 How to become part of a BotNet?
 What damage can they do?
 How to combat them?
What is BotNet?
 Bot or Zombie computer.
             Programs which respond autonomously to
       particular external events are bots.
 Network of Bots is BotNet.
 Operator giving instructions to only a small number of
  machines. These machines then propagate the
  instructions to other compromised machines, usually
  via IRC.
Types of Bots
 Some popular Bots :

   GT-Bot
       Global Threat bot based on IRC clients for window.

       Used to control the activity of the remote system.

   AgoBot
       Most popular bots used by crackers.

       It is written in C++

       It provides many mechanisms to hide its presence on the host
        computer
Types of Bots
  DSNX
      Dataspy Network X bot

      Written in C++

      New functionality to this bot is very easy and its simple plug–in
       architecture.
  SDBot
      Written in C

      Unlike Agobot, its code is not very clear and the software itself
       comes with a limited set of features
Internet Relay Chat
 IRC stands for Internet Relay Chat.
 Protocol for real time chat communication.
 Based on Client-Server Architecture.
 IRC user communication mode
       Public
       Private.
 Flexible & allow user to hide identity.
Structure of BotNet
Elements of An AttaCk
 An attacker first spreads a trojan horse, which infects
  various hosts. These hosts become zombies and
  connect to the IRC server in order to listen to further
  commands.
 The IRC server can either be a public machine in one
  of the IRC networks or a dedicated server installed by
  the attacker on one of the compromised hosts.
 Bots run on compromised computers, forming a
  botnet.
How to become part of
BotNet
 Trojans
       Spread by social engineering (Spam, Software Download)
       email attachment
       SMTP engine
 Direct infection
       Scan and exploit (Blaster…)
 Exploit
       Spread by social engineering (Phishing)
       Bad luck (visit the wrong site…)
What damage can they do?
1. DDoS
       Victim is flooded with more request than it can
        handle.
       used to damage or take down a competitor’s website.
       Example:
  On-line gambling sites (e.g. Total bet)
  Anti DDoS by utilising widely distributed DNS and Hosting servers
  Hit by DDoS towards their DNS, affected 4% of their customers
   Fraud
      Pay per click adware
     Harvest large number of Bots to spread adware
     Collect Banking details, selling credit card numbers by the
     thousand
             Identity Theft ($25 up to $200 for identity with a
             good credit record)
 Use of resources
     Proxy
     Spam
     DDoS
How to Combat them?
 Firewalls/AV
 Desktop management
 Education
 Secure OS
 Law enforcement
       National high tech crime unit
       FBI
How to Combat them?
 Netstat
       Flexible tool available both for Windows and UNIX systems.
       Its main function is control of the active ports
       Netstat examines listening TCP and UDP ports.
       Provides detailed information on network activity.
Questions ? & Summary
   Botnets
        What they are
        How they grow
        What they do
        How to combat
Botnet

Mais conteúdo relacionado

Mais procurados

Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
Bini Bs
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
Team Firefly
 

Mais procurados (19)

Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
Botnets
BotnetsBotnets
Botnets
 
about botnets
about botnetsabout botnets
about botnets
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Botnets presentation
Botnets presentationBotnets presentation
Botnets presentation
 
Botnets In Cyber Security
Botnets In Cyber SecurityBotnets In Cyber Security
Botnets In Cyber Security
 
Botnets
BotnetsBotnets
Botnets
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
Botnet
BotnetBotnet
Botnet
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
BOTLAB excersise
BOTLAB excersiseBOTLAB excersise
BOTLAB excersise
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 

Destaque (10)

2 dc meet new
2 dc meet new2 dc meet new
2 dc meet new
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Ddos Sızma Testleri - 2
Ddos Sızma Testleri - 2Ddos Sızma Testleri - 2
Ddos Sızma Testleri - 2
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing ppt
 
Green Computing
Green ComputingGreen Computing
Green Computing
 
Green computing
Green computingGreen computing
Green computing
 

Semelhante a Botnet

Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
Zotronix
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
UltraUploader
 

Semelhante a Botnet (20)

BOTNETS
BOTNETSBOTNETS
BOTNETS
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
098
098098
098
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
Bots and malware
Bots and malwareBots and malware
Bots and malware
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Botnet

  • 1.
  • 2. Overview  What is a BotNet?  Internet Relay Chat  How to become part of a BotNet?  What damage can they do?  How to combat them?
  • 3. What is BotNet?  Bot or Zombie computer. Programs which respond autonomously to particular external events are bots.  Network of Bots is BotNet.  Operator giving instructions to only a small number of machines. These machines then propagate the instructions to other compromised machines, usually via IRC.
  • 4. Types of Bots  Some popular Bots :  GT-Bot  Global Threat bot based on IRC clients for window.  Used to control the activity of the remote system.  AgoBot  Most popular bots used by crackers.  It is written in C++  It provides many mechanisms to hide its presence on the host computer
  • 5. Types of Bots  DSNX  Dataspy Network X bot  Written in C++  New functionality to this bot is very easy and its simple plug–in architecture.  SDBot  Written in C  Unlike Agobot, its code is not very clear and the software itself comes with a limited set of features
  • 6. Internet Relay Chat  IRC stands for Internet Relay Chat.  Protocol for real time chat communication.  Based on Client-Server Architecture.  IRC user communication mode  Public  Private.  Flexible & allow user to hide identity.
  • 8. Elements of An AttaCk  An attacker first spreads a trojan horse, which infects various hosts. These hosts become zombies and connect to the IRC server in order to listen to further commands.  The IRC server can either be a public machine in one of the IRC networks or a dedicated server installed by the attacker on one of the compromised hosts.  Bots run on compromised computers, forming a botnet.
  • 9. How to become part of BotNet  Trojans  Spread by social engineering (Spam, Software Download)  email attachment  SMTP engine  Direct infection  Scan and exploit (Blaster…)  Exploit  Spread by social engineering (Phishing)  Bad luck (visit the wrong site…)
  • 10. What damage can they do? 1. DDoS  Victim is flooded with more request than it can handle.  used to damage or take down a competitor’s website. Example:  On-line gambling sites (e.g. Total bet)  Anti DDoS by utilising widely distributed DNS and Hosting servers  Hit by DDoS towards their DNS, affected 4% of their customers
  • 11. Fraud Pay per click adware Harvest large number of Bots to spread adware Collect Banking details, selling credit card numbers by the thousand Identity Theft ($25 up to $200 for identity with a good credit record)  Use of resources Proxy Spam DDoS
  • 12. How to Combat them?  Firewalls/AV  Desktop management  Education  Secure OS  Law enforcement  National high tech crime unit  FBI
  • 13. How to Combat them?  Netstat  Flexible tool available both for Windows and UNIX systems.  Its main function is control of the active ports  Netstat examines listening TCP and UDP ports.  Provides detailed information on network activity.
  • 14. Questions ? & Summary  Botnets  What they are  How they grow  What they do  How to combat