Bots & Botnets

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 30: Line 30:
***The chain of command may be compromised above the level.
***The chain of command may be compromised above the level.
== Bot Management ==
== Bot Management ==
-
 
+
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.
 +
that isn't on wikipedia!
== How to Fight Botnets ==
== How to Fight Botnets ==

Revision as of 21:38, 13 April 2008

insert description here

Contents

Definitions

  • Bot
  • Herder
  • Scrumping

Bot

Herder

Zombie

Scrumping

Attacks

  • DDoS
  • Spamming
  • Phishing

DDoS

Spamming

Phishing

Life Cycle

  • Intial setup of configuration settings of the bot
  • Register a Dynamic DNS
  • Infect a PC with a bot
    • Bot propagates according to the configuration settings
    • Scans for vunerabilities
    • Idle
    • Performs actions as recieved by other bots above it in the chain of command
    • Bot dies:
      • Bot may be taken over by another botnet
      • The bot's owner's pc realizes the pc is a zombie, kills the bot.
      • The chain of command may be compromised above the level.

Bot Management

They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel. that isn't on wikipedia!

How to Fight Botnets

References

"Botnet"

See Also

"Alternative Technologies for Ethernet"

External Links

Personal tools