Bots & Botnets
From Computing and Software Wiki
(Difference between revisions)
(→External Links) |
(→How to Fight Botnets) |
||
Line 33: | Line 33: | ||
== How to Fight Botnets == | == How to Fight Botnets == | ||
+ | ===Norton Anti-Bot=== | ||
== References == | == References == |
Revision as of 21:41, 13 April 2008
insert description here
Contents |
Definitions
- Bot
- Herder
- Scrumping
Bot
Herder
Zombie
Scrumping
Attacks
- DDoS
- Spamming
- Phishing
DDoS
Spamming
Phishing
Life Cycle
- Intial setup of configuration settings of the bot
- Register a Dynamic DNS
- Infect a PC with a bot
- Bot propagates according to the configuration settings
- Scans for vunerabilities
- Idle
- Performs actions as recieved by other bots above it in the chain of command
- Bot dies:
- Bot may be taken over by another botnet
- The bot's owner's pc realizes the pc is a zombie, kills the bot.
- The chain of command may be compromised above the level.
Bot Management
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.
How to Fight Botnets
Norton Anti-Bot
References
See Also
"Alternative Technologies for Ethernet"
External Links
http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nab1