Bots & Botnets

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Bot Management)
(External Links)
Line 39: Line 39:
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet "Alternative Technologies for Ethernet"]<br>
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet "Alternative Technologies for Ethernet"]<br>
== External Links ==
== External Links ==
 +
http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nab1

Revision as of 21:40, 13 April 2008

insert description here

Contents

Definitions

  • Bot
  • Herder
  • Scrumping

Bot

Herder

Zombie

Scrumping

Attacks

  • DDoS
  • Spamming
  • Phishing

DDoS

Spamming

Phishing

Life Cycle

  • Intial setup of configuration settings of the bot
  • Register a Dynamic DNS
  • Infect a PC with a bot
    • Bot propagates according to the configuration settings
    • Scans for vunerabilities
    • Idle
    • Performs actions as recieved by other bots above it in the chain of command
    • Bot dies:
      • Bot may be taken over by another botnet
      • The bot's owner's pc realizes the pc is a zombie, kills the bot.
      • The chain of command may be compromised above the level.

Bot Management

They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.

How to Fight Botnets

References

"Botnet"

See Also

"Alternative Technologies for Ethernet"

External Links

http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nab1

Personal tools