180 likes | 338 Views
Botnets. Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen. What is a Botnet?. Attacker controls remote computer Any attack that allows execution of code Virus, worm, Trojan horse, etc. Controlled machine known as “zombie” “Phones home” via IRC
E N D
Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen
What is a Botnet? • Attacker controls remote computer • Any attack that allows execution of code • Virus, worm, Trojan horse, etc. • Controlled machine known as “zombie” • “Phones home” via IRC • Joins a pre-specified channel • Attacker gives commands on channel • Network of these machines is a botnet ECE 4112 - Internetwork Security
Controlling a Botnet ECE 4112 - Internetwork Security
How big is a Botnet? • Size ranges from 10 to 10,000 • Largest recorded: 50,000 • Could be much larger ECE 4112 - Internetwork Security
Purpose of Botnets • Spamming • Send large amounts of text to chat rooms in mIRC • Send out spam emails • Sniffing Traffic • Use packet sniffers to find passwords and usernames on supposedly secure networks ECE 4112 - Internetwork Security
Purpose of Botnets (cont’d) • Keylogging • Log and send private information like name, ssn, credit card info etc. • Spread Malware • Install various malicious programs • Install Advertisement addons • Make money from autoclicking banners • Manipulate online polls ECE 4112 - Internetwork Security
Purpose of Botnets (cont’d) • DDOS • Even a small botnet (~1000 machines) can be effective. • Each computer is attacking, which can offer more than 100Mb/sec in an attack • This is enough to cripple most Company networks • A large botnet (~50000 machines) • Each computer contributes roughly 128Kb/sec on average. • Roughly 5000Mb/sec ECE 4112 - Internetwork Security
Often used in Corporate attacks. • Easily disable most networks • Become a kind of Hacker Mercenary ECE 4112 - Internetwork Security
What can a typical bot do? • Gather Computer Information • Cpu speed, memory, etc • Keylogger • Credit card information, name, ssn etc • Portscan • Bypass firewalls by scanning from behind the firewall • Infect other computers with the trojan ECE 4112 - Internetwork Security
Types of Bots • Script Based • Run from installing a IRC client and running malicious scripts on it. • Code based • Run from an executable created from a source code file, do not require any other files than the initial executable. ECE 4112 - Internetwork Security
Detecting a Botnet • Packet sniffing does not work • IRC helps to make master anonymous. • Infected computers typically send spoofed packets. • Manual Detection • Watch IRC clients for odd activity • Look for suspicious names • Look for login verification ECE 4112 - Internetwork Security
Who does a Botmaster target? • Most botnets spread from old exploits • Most targeted computers are “home pc” as many users do not patch their operating system. • Allows botnets to run rampant and infect large amounts of computers automatically ECE 4112 - Internetwork Security
What protects against infection? • A botnet is basically just a special form of trojan • Firewalls • Anti-Virus • Intelligent Downloading ECE 4112 - Internetwork Security
What will you do in lab? • Install mIRC • Connect to the IRC Server • View source code for both GT-bot and SD-bot, some of the earlier bots • Configure and infect a computer with both bots ECE 4112 - Internetwork Security
Control each bot and compare the power of each • Explore the capabilities of a botnet ECE 4112 - Internetwork Security
Conclusions • Easy to spread • Hard to detect • Very powerful ECE 4112 - Internetwork Security
Questions? • Comments? ECE 4112 - Internetwork Security
References • http://askmatador.com/ep/bots/ • http://www.honeynet.org/papers/bots/ • http://zine.dal.net/previousissues/issue22/botnet.php ECE 4112 - Internetwork Security