Bots & Botnets
From Computing and Software Wiki
(Difference between revisions)
(→Bot Management) |
(→External Links) |
||
Line 39: | Line 39: | ||
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet "Alternative Technologies for Ethernet"]<br> | [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet "Alternative Technologies for Ethernet"]<br> | ||
== External Links == | == External Links == | ||
+ | http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nab1 |
Revision as of 21:40, 13 April 2008
insert description here
Contents |
Definitions
- Bot
- Herder
- Scrumping
Bot
Herder
Zombie
Scrumping
Attacks
- DDoS
- Spamming
- Phishing
DDoS
Spamming
Phishing
Life Cycle
- Intial setup of configuration settings of the bot
- Register a Dynamic DNS
- Infect a PC with a bot
- Bot propagates according to the configuration settings
- Scans for vunerabilities
- Idle
- Performs actions as recieved by other bots above it in the chain of command
- Bot dies:
- Bot may be taken over by another botnet
- The bot's owner's pc realizes the pc is a zombie, kills the bot.
- The chain of command may be compromised above the level.
Bot Management
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.
How to Fight Botnets
References
See Also
"Alternative Technologies for Ethernet"
External Links
http://www.symantec.com/norton/products/overview.jsp?pcid=is&pvid=nab1