<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Rosard&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Rosard&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Rosard"/>
		<updated>2026-05-21T13:37:15Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T23:46:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread through the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to increase the spread of these threats. One powerful way of this spread, has been through Bots that integrate Botnets, which are the main focus of this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]] (C&amp;amp;C) infrastructure. These new installed malicious software (most likely to exist in machines that run on [[Windows]] OS - most used OS in the world -, which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine through a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|200px|frame|Schematic time line of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What actions are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used (mainly as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network) and ways to detain it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” through where the IRC commands will be sent, or through a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated with any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys through &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Through files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As mentioned before, information is the most valuable resource of our century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some signs of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless; although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data through these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet looking for these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should have not being used by any host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organizations that wish to verity if their network has any irregularity. Although they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic not to fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection through the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is a commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something; otherwise, Norton will simply leave it alone in its idle mode. Since it is a commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been proved to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate these Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 19:49, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T18:29:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread through the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to increase the spread of these threats. One powerful way of this spread, has been through Bots that integrate Botnets, which are the main focus of this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]] (C&amp;amp;C) infrastructure. These new installed malicious software (most likely to exist in machines that run on [[Windows]] OS - most used OS in the world -, which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine through a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|200px|frame|Schematic time line of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What actions are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used (mainly as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network) and ways to detain it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” through where the IRC commands will be sent, or through a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated with any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys through &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Through files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As mentioned before, information is the most valuable resource of our century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some signs of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless; although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data through these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet looking for these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should have not being used by any host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organizations that wish to verity if their network has any irregularity. Although they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic not to fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection through the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is a commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something; otherwise, Norton will simply leave it alone in its idle mode. Since it is a commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been proved to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate these Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 09:49, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:49:37Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|200px|frame|Schematic time line of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 09:49, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:47:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;/* Life cycle of a Botnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|200px|Schematic time line of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:45:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;/* Life cycle of a Botnet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|250px|Schematic timeline of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:42:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;/* External Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|thumb| Detailed timeline of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [http://www.symantec.com/index.jsp Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007 Segurança UOL], Internet Attacks on 2007 (portuguese)&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:41:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg|right|Bots]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
[[Image:Untitled-1.jpg|right|thumb| Detailed timeline of a Botnet]]&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg|thumb|right]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [www.symantec.com Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007], Internet Attacks on 2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Untitled-1.jpg</id>
		<title>File:Untitled-1.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Untitled-1.jpg"/>
				<updated>2009-04-12T13:35:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:21:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:20080923-spam-botnet.jpg]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
[[Image:Talking-trojan.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [www.symantec.com Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007], Internet Attacks on 2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:20:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;         [[Image:20080923-spam-botnet.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
[[Image:Talking-trojan.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [www.symantec.com Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007], Internet Attacks on 2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:19:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:20080923-spam-botnet.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
[[Image:Talking-trojan.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [www.symantec.com Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007], Internet Attacks on 2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T13:18:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
[[Image:20080923-spam-botnet.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???==&lt;br /&gt;
[[Image:Talking-trojan.jpg]]&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Vk bb 0508 pic02.png]]&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
[[Image:Spam2 2.jpg]]&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
* [www.symantec.com Symantec], Symantec&lt;br /&gt;
* [http://idgnow.uol.com.br/seguranca/2007], Internet Attacks on 2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:300_107540.gif</id>
		<title>File:300 107540.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:300_107540.gif"/>
				<updated>2009-04-12T13:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Vk_bb_0508_pic02.png</id>
		<title>File:Vk bb 0508 pic02.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Vk_bb_0508_pic02.png"/>
				<updated>2009-04-12T13:08:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Talking-trojan.jpg</id>
		<title>File:Talking-trojan.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Talking-trojan.jpg"/>
				<updated>2009-04-12T13:08:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:20080923-spam-botnet.jpg</id>
		<title>File:20080923-spam-botnet.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:20080923-spam-botnet.jpg"/>
				<updated>2009-04-12T13:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Bbc_chimera_botnet11.jpg</id>
		<title>File:Bbc chimera botnet11.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Bbc_chimera_botnet11.jpg"/>
				<updated>2009-04-12T13:07:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Spam2_2.jpg</id>
		<title>File:Spam2 2.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Spam2_2.jpg"/>
				<updated>2009-04-12T13:07:17Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T12:43:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== Enrolling in the Botnet War ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== TCPDump ===&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source [[Sniffer]] is the [[TCPDump]] (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
=== DarkNets ===&lt;br /&gt;
The combat against Botnets has been been really intense in the latest years. Today, there are gropus dedicated to only search the Internet in the search of these &amp;quot;Zombies&amp;quot; networks. There are some networks that are exclusively running only as a trap to catch these Botnets; they are called [[Darknets]]. The term Darknet is used to determine a range of IP addresses which should been not being used by no host in the network. The truth is that network on these IP addresses is considered illegal.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Darknets can be used by organization that with to verity if their network has any irregularity. Although, they are getting more famous on the combat of Botnets, some Botnets are getting smarter and utilizing tools to monitor traffic to not fall easily into these traps.&lt;br /&gt;
=== A common weak point from a Botnet ===&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
The fight is not over yet! We can't let this terrible security threat take over our Internet bandwidth for illicit traffic. There are techniques out there that can be used for prevention, but they haven't been prove to be really generic to recognize and exterminate the most common Bots and its derivatives.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Another &amp;quot;advantage&amp;quot; is that when a Bot Herder tries to infect a machine that has been compromised by other Bot, it first closes the processes, deactivate them, and finally destroys that Bot; this has been vastly called Botnet War. Once this Bot exterminating procedure can come out from the shadows, a tool can be implemented to exterminate this Botnets in a efficient way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In conclusion, there are still a lot of aspects to be searched, discussed and studied to find ways to exterminate Botnets. We should join forces against this threat that is out there compromising our Internet day by day, or better phased, byte by byte...&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[3] – www.symantec.com/avcenter/reference/&lt;br /&gt;
[2] – www.bookworms.ca&lt;br /&gt;
[6] -http://pcworld.uol.com.br/reportagens/2006/08/07idgnoticia.200607.8123032606&lt;br /&gt;
[9] – http://menno.b10m.net/blog/blosxom.cgi/2007/01/08#botnet-muie&lt;br /&gt;
[10] – http://hackerseguranca.blogspot.com/feeds/post/default&lt;br /&gt;
[11] – http://idgnow.uol.com.br/seguranca/2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T07:12:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, [[mIRC]] based. Runs scripts in response to IRC server events Supports raw [[TCP]] and [[UDP]] [[Socket]] connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in [[C++]] where its source code is available to [[hacker]] community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 [[Symantec]] released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, [[McAfee]] was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank [[ATM]] service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, [[Microsoft]] has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to [[VeriSign]], the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the [[FBI]].&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the [[International Botnet Task Force]] since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, [[Vint Cerf]], has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending [[spam]] and [[spy ware]] and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for [[Facebook]] that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of [[Computer Science]] in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open [[ports]], and overriding [[Internet Cookies and Confidentiality|authentication mechanisms]] that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces ([[APIs]]) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Phishing ===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the [[Phishing|Phisher]] sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of layman users today, still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as [[key loggers]] to record key strokes or even [[Screen Loggers]] to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match [[IP Address]]&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious [[ARR(s)]] associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War??? ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== TCPDump ====&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the TCPDump (www.tcpdump.org). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
==== DarkNets ====&lt;br /&gt;
O combate às botnets vem se tornando cada vez mais intenso. Atualmente, existem grupos dedicados especialmente a vasculhar a Internet a procura dessas redes “Zombies”. Existem até mesmo redes feitas exclusivamente para capturar botnets funcionando como uma verdadeira armadilha, essas redes são chamadas de “Darknets”.&lt;br /&gt;
O termo “darknet” é utilizado para detonar um espaço de endereços IP que não devem ser usados por nenhum “host” na rede. Em outras palavras, tráfego nesses endereços IP são considerados tráfego ilícito. Darknet podem ser utilizadas em organizações que desejam verificar se sua rede está com algum comportamento irregular. Porém, elas estão sendo cada vez mais empregadas por pesquisadores e grupos que combatem botnets. Uma vez criada, a botnet pode utilizar alguma ferramenta de “scanning” para monitorar a rede. Isto pode revelar informações importantes.&lt;br /&gt;
==== A common weak point from a Botnet ====&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Norton Anti-Bot ====&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
O presente relatório foi elaborado com o objetivo de começar uma pesquisa sobre bots e botnets, objetivando a criação de uma ferramenta que seja capaz de detectar incidências desses malware em um host individual e/ou em uma rede completa. Vimos, no decorrer do relatório, que muitas técnicas e ferramentas voltadas para tal objetivo já estão sendo empregadas. Porém, nenhumas das que foram citadas se mostrou genérica o bastante para reconhecer os bots mais comuns e seus variantes. Vale salientar que essa pesquisa está apenas começando. Em outras palavras este documento sofrerá atualizações no decorrer do tempo e da evolução dos bots, tentando acompanhar as inovações dos que estão envolvidos em desenvolver novas armas para melhorar o combate esses tipos de ameaças. Tem-se em mente que não será uma tarefa das mais fáceis, mas o desafio será recompensador e proveitoso. Durante a pesquisa foram observadas algumas peculiaridades dos bots que se usados como arma no combate a eles mesmos pode ser de grande ajuda. Por exemplo, quando um botherder tenta infectar uma máquina que já se encontra comprometida com outro bot que não lhe pertence, esse usa comandos para que o seu bot procure e remova o bot “inimigo”, o que se chama de guerras de botnets. Uma vez descoberto como isso acontece será um grande passo na implementação da ferramenta. Um outro fato interessante é uma função do RBot e seus variantes, os quais têm a capacidade de finalizar processos relacionados a outros tipos de “malware”. Enfim existem muitos aspectos para se pesquisar e aprender sobre essa crescente ameaça, que se torna cada dia mais forte!&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[3] – www.symantec.com/avcenter/reference/&lt;br /&gt;
[2] – www.bookworms.ca&lt;br /&gt;
[6] -http://pcworld.uol.com.br/reportagens/2006/08/07idgnoticia.200607.8123032606&lt;br /&gt;
[9] – http://menno.b10m.net/blog/blosxom.cgi/2007/01/08#botnet-muie&lt;br /&gt;
[10] – http://hackerseguranca.blogspot.com/feeds/post/default&lt;br /&gt;
[11] – http://idgnow.uol.com.br/seguranca/2007&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T03:16:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the [[anti-viruses]] systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “[[Proxy Server|Proxys]]” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the [[crackers]] hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other Bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti-virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spy ware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the Phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as key loggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War??? ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the &amp;lt;ref&amp;gt;[www.tcpdump.org TCPDump]&amp;lt;/ref&amp;gt;. This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T03:09:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the [[Internet|internet network]], which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as [[viruses]], [[Computer worms|worms]], [[Trojan horses]] and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called [[Zombie computers]]), usually installed via worms, Trojan horses, or through [[Back doors]], under a common [[command-and-control]](C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on [[Windows]] OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on [[Linux]] or [[Mac]] OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel ([[IRC]], [[Web Server]] or [[Peer to Peer File Sharing|P2P Server]]), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic [[DNS]] ([[DDNS]])&lt;br /&gt;
* Register a [[static IP]]&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data [[integrity]], [[availability]] and [[confidentiality]] of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spy ware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the Phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as key loggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War??? ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the &amp;lt;ref&amp;gt;[www.tcpdump.org TCPDump]&amp;lt;/ref&amp;gt;. This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T02:52:39Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spy ware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the Phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as key loggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War??? ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the &amp;lt;ref&amp;gt;[www.tcpdump.org TCPDump]&amp;lt;/ref&amp;gt;. This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T02:49:37Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spy ware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the Phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as key loggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War??? ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the TCPDump ([www.tcpump.org TCPDump]). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T02:46:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, has its healthiness’ such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealth has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. This vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behave like “worm” processes, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then, they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from the infected user PC, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers; however an exponential number of Bots integrating a Botnet can be way more catastrophic turn of events.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines (infected PC’s) are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privacy privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague? On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. These layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the Bot client modules is usually set to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, Bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, Bots needed to be able to operate as the channel operator. This turn of events lead the Bots apps to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to the users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released an internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active Bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active Bot network computers. They also discovered that many bots were not usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) Bot related. The national telecommunication company reported the following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; a small Botnet of 10,000 Bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into pod casts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spy ware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks: Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the Phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whomever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as key loggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not Phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes its detection challenging. There are some tools that have been used against this threat, some in open source, and other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do to fight in the Botnet War!!! ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots, we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source Sniffer is the TCPDump ([[www.tcpump.org| TCPDump]]). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of Sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of the biggest weaknesses from a Botnet is that, due to its inheritance of the C&amp;amp;C structure, once the higher level Bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in its idle mode. Since its commercial software, there are the benefits such as assistance and update patches as new Bots definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 10:46, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T02:20:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes it's detection challenging. There are some tools that have been used against this threat, some in open source, other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&lt;br /&gt;
=== What can I do? Let's go to the Botnet War!!! ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless. Although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source sniffer is the tcpdump ([www.tcpump.org]). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of it's biggest weakness is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in it's iddle mode. Since it's a commercial software, it has the benefits such as assistance and update patches as new Bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T01:41:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes it's detection challenging. There are some tools that have been used against this threat, some in open source, other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What can I do? Let's go to the Botnet War!!! ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless. Although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source sniffer is the tcpdump ([www.tcpump.org]). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of it's biggest weakness is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunately, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in it's iddle mode. Since it's a commercial software, it has the benefits such as assistance and update patches as new Bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets (portuguese version)&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing], Phishing&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet Alternative Technologies for Ethernet], Alternative Technologies for Ethernet&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing], Phishing&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Internet_Control_Message_Protocol Internet Control Message Protocol], IMCP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks] DNS Attacks&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Cryptography_in_Information_Security Cryptography], Cryptography&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Proxy Proxy Servers], Proxy Server&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Network_firewall Network Firewall], Network Firewall&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Malware Malwares], Malwares&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer to Peer Network Security], Peer to Peer Network Security&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Simple_Mail_Transfer_Protocol Simple Mail Transfer Protocol], SMTP&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Email_Security Email Security], Email Security&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-12T01:12:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
* Initial setup of configuration settings of the Bot parameters such as infection vectors, payload, stealth, C&amp;amp;C details&lt;br /&gt;
* Register a dynamic DNS (DDNS)&lt;br /&gt;
* Register a static IP&lt;br /&gt;
* Bot Herder infect PC's with the Bot(s)&lt;br /&gt;
** Bot propagates the infection according to the configuration settings&lt;br /&gt;
** Bot scans for vulnerabilities that it may encounter&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The owner of an infected PC with a Bot realizes the PC is a zombie so it kills the Bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are others distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The detection of Bots is a really difficult task. The big variety of the malicious code for these kind of application really makes it's detection challenging. There are some tools that have been used against this threat, some in open source, other for commercial purposes. Unfortunately, none of them have been sufficiently generic to detect all varieties of the most common Bots. In the mean time we should use some techniques and tools to detect and/or prevent the infection.&lt;br /&gt;
&lt;br /&gt;
=== Some sings of infection by Bots ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doesn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== What can I do? Let's go to the Botnet War!!! ===&lt;br /&gt;
Monitoring the network traffic, at the first instance, can look useless. Although, it can be a key and effective action when executed with efficiency. For example, by knowing the ports that are most used for the Bot Herder's communication with the Bots we can modify the flow of data though these ports or maybe even verify if they are open when they should be closed, for example.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A way to make this monitoring more reliable is the integration of these functions to a &amp;quot;logging&amp;quot; analysis of host(s). A really good open source sniffer is the tcpdump ([www.tcpump.org]). This application makes the capture of packets possible in a whole network, or even from only one individual host though a specific port by using a filtering option. This is really important, because a lot of sniffers capture &amp;quot;noise packets&amp;quot; from other hosts which implies in a harder analysis.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
With this power, from the moment that we determine a host which could be used as a zombie computer in a Botnet, we use the following command to capture it's traffic, for example, from coming from it's port 6667 (common port for communication with Bot Herders):&lt;br /&gt;
* # tcpdump –X –s 1500 host 192.168.1.1 and tcp port 6667&lt;br /&gt;
By reaching the conclusion of infection though the packets analysis, it is possible to detect which type of C&amp;amp;C is being used to the communication between the Bot Client and Bot Herder and even, deactivate the Botnet by deactivating the communication channel.&lt;br /&gt;
One of it's biggest weakness is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Norton Anti-Bot ===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. Unfortunetelly, its design only takes action if the Bot software actually does something, if not, Norton will simply leave it alone in it's iddle mode. Since it's a commercial software, it has the benefits such as assistance and update patches as new Bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T21:30:11Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
&lt;br /&gt;
* Initial setup of configuration settings of the Bot&lt;br /&gt;
* Register a Dynamic DNS&lt;br /&gt;
* Infect a PC with a Bot&lt;br /&gt;
** Bot propagates according to the configuration settings&lt;br /&gt;
** Scans for vulnerabilities&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions as received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
The biggest weak point known is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised, the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Some Signals of Bots running ===&lt;br /&gt;
* High invisible to visible user ratio&lt;br /&gt;
* High user to channel ratio&lt;br /&gt;
* Server display name doedn't match IP Address&lt;br /&gt;
* Suspicious nicks, topics and channel names&lt;br /&gt;
* Suspicious DNS name used to find server(s)&lt;br /&gt;
* Suspicious ARR(s) associated with DNS name&lt;br /&gt;
* Connected hosts exhibiting suspicious behavior&lt;br /&gt;
* TCP port 6667 open when an IRC client is not running&lt;br /&gt;
* IRC port 113 usually suggests bots. This port has being mainly used to be a data port from the Bot to the Bot Herder.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. &lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
or ISBN-13: 978-1-59749-135-8&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Phishing Phishing]&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Phishing Phishing]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T20:24:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
&lt;br /&gt;
* Initial setup of configuration settings of the Bot&lt;br /&gt;
* Register a Dynamic DNS&lt;br /&gt;
* Infect a PC with a Bot&lt;br /&gt;
** Bot propagates according to the configuration settings&lt;br /&gt;
** Scans for vulnerabilities&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions as received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
A weak point is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
ISBN-13: 978-1-59749-135-8&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://en.wikipedia.org/wiki/Phishing]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service Facebook Botnet risk Revealed],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service Sun Grid hit by a network attack], Denial of service at Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service DoS may shut down the Internet],DoS can shut down the internet&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet Botnet], Botnets&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software Build your own Botnet with a open source software] Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm Botnet attacks: Denial of Service], Botnet and denial of service&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service A million zombies threaten US national security], A million zombies threaten US national security&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Multi-agent systems]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T20:18:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
&lt;br /&gt;
* Initial setup of configuration settings of the Bot&lt;br /&gt;
* Register a Dynamic DNS&lt;br /&gt;
* Infect a PC with a Bot&lt;br /&gt;
** Bot propagates according to the configuration settings&lt;br /&gt;
** Scans for vulnerabilities&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions as received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
A weak point is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
ISBN-13: 978-1-59749-135-8&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://en.wikipedia.org/wiki/Phishing]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
* [http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1|&amp;quot;Norton AntiBot&amp;quot;], Norton Anti-Bot&lt;br /&gt;
* [http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;],Dutch Botnet Suspects Ran 1.5 Million Machines&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service],Facebook risk application&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service], Denial of service of Sun Grid&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service],DoS can shut down the internet&lt;br /&gt;
* [http://pt.wikipedia.org/wiki/Botnet]|Botnets&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Botnet]|Botnets&lt;br /&gt;
* [http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software],Build your own Botnet&lt;br /&gt;
* [http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm|Attacks], Botnet and denial of service&lt;br /&gt;
* [http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service], A million zombies threaten US national security]&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Multi-agent systems]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T20:11:11Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
&lt;br /&gt;
* Initial setup of configuration settings of the Bot&lt;br /&gt;
* Register a Dynamic DNS&lt;br /&gt;
* Infect a PC with a Bot&lt;br /&gt;
** Bot propagates according to the configuration settings&lt;br /&gt;
** Scans for vulnerabilities&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions as received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application which is a copyright crime of the software and a theft of whoever user bought the original key.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even Screen Loggers to view the infected PC's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
A weak point is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
Craig A. Schiller, Jim Binkley, David Harley, Gadi Evron, Tony Bradley, Carsten Willems, Michael Cross. (2007) Botnet, the killer app, Syngress, ISBN-10: 1-59749-135-7&lt;br /&gt;
ISBN-13: 978-1-59749-135-8&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[[http://en.wikipedia.org/wiki/Phishing]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1|&amp;quot;Norton AntiBot&amp;quot;]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;|Dutch Botnet Suspects Ran 1.5 Million Machines]] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service|Facebook risk application]]&lt;br /&gt;
[[http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service|Denial of service of Sun Grid]]&lt;br /&gt;
[[http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service|DoS can shut down the internet]]&lt;br /&gt;
[[http://pt.wikipedia.org/wiki/Botnet|Botnets]]&lt;br /&gt;
[[http://en.wikipedia.org/wiki/Botnet|Botnets]]&lt;br /&gt;
[[http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software|Build your own Botnet]]&lt;br /&gt;
[[http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm|Attacks, Botnet and denial of service]]&lt;br /&gt;
[[http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service|A million zombies threaten US national security]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer network security]]&lt;br /&gt;
[[Category:Spamming]]&lt;br /&gt;
[[Category:Multi-agent systems]]&lt;br /&gt;
[[Category:Botnets]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;br /&gt;
--[[User:Rosard|Rosard]] 16:00, 11 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T19:44:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control(C&amp;amp;C) infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine. The Bot camouflages itself, maintaining a low profile (using the least system resources for example before ordered to attack) and only then they connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker (Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot clients to a much greater threat and risk, such as a Botnet. An individual Bot by itself has a few powers, however an exponential number of Bots integrating a Botnet can be way more catastrophic.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of zombie machines are used in a network to create a more powerful and sophisticated invasion technique then the one's knew before.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each Bot that can distribute orders and commands from the Bot Herder to others PC's that come in contact in a certain way with this PC. This leads to the exponentially grow characteristic of Botnets.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Life cycle of a Botnet ===&lt;br /&gt;
&lt;br /&gt;
* Initial setup of configuration settings of the Bot&lt;br /&gt;
* Register a Dynamic DNS&lt;br /&gt;
* Infect a PC with a Bot&lt;br /&gt;
** Bot propagates according to the configuration settings&lt;br /&gt;
** Scans for vulnerabilities&lt;br /&gt;
** Idle&lt;br /&gt;
** Performs actions as received by other Bots above it in the chain of command&lt;br /&gt;
** Bot dies:&lt;br /&gt;
*** Bot may be taken over by another Botnet&lt;br /&gt;
*** The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
*** The chain of command may be compromised above the level.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the whole concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss how has this threat being used and ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of a computer network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even ScreenLoggers to view the infected pc's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
A weak point is that due to it's inheritance of the C&amp;amp;C structure, once the higher level bots are compromised the effectiveness of the Botnet can be severally reduced. If the main Bot Herder server is taken down, the entire Botnet fails.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T19:05:30Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;First&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Botnet Herder sends out viruses or worms, infecting ordinary users' computers, with the Bot application&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Second&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Third&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A Spammer purchases access to the Botnet from the Bot Herder&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fourth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Spammer sends command instructions via the IRC server to the infected PCs&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Fifth&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;When the commands are acknowledged, the infected zombies machines will send out spam messages to mail servers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
This method works like spamming. However, instead of trying to sell a service to the spammers, the phisher sends mass of email trying to look is trying to obtain valuable credit card information by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and software keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id, password and information theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. Bots also are able to work as keyloggers to record key strokes or even ScreenLoggers to view the infected pc's monitor. By stealing an Id and password from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes. Let's not also forget the credit card password and number theft, which can be vastly used to steal user's money (this method is not phishing).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed denial of Service attack (DDoS) ===&lt;br /&gt;
The Botnet floods a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his Botnet by taking down the website server, then contacts the website administrator in question and extorts them for money; we can actually think of this by being some sort of &amp;quot;kidnapping&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Scrumping ===&lt;br /&gt;
A Bot steals CPU cycles to perform calculations from the host computer. This can be used as a positive means if the Botnet is configured to not automatically propagate into systems that do not want it. The Sun's Grid system is a distributed calculation system for extra-terrestrial life that is done with the user's concern and understanding. There are other's distributed application, but usually they don't have inoffensive purposes like the Grid System.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Phishing&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T18:28:43Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that will be downloaded and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This all casts doubt on the capability of anti virus software to claim that a system is actually clean when it encounters and cleans one component of a multi-component Bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the &amp;quot;father of the Internet&amp;quot;, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Types of attacks and profit ==&lt;br /&gt;
&lt;br /&gt;
=== Spam ===&lt;br /&gt;
A Herder can sell his Botnet services to a spammer. This hides the identity of the spammer as he can have anonymous distribution of his messages though the Bots on the Botnet. Another advantage is the speed. A spammer will also be able to send incredible amounts of messages via the Bots then he normally could. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
On the table bellow, there is the flow of steps to a Botnet use spam to profit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Steps&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Action&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A botnet operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application -- the bot.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The bot on the infected PC logs into a particular C&amp;amp;C server (often an IRC server, but, in some cases a web server).&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A spammer purchases access to the botnet from the operator.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The spammer sends instructions via the IRC server to the infected PCs, ...&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;...causing them to send out spam messages to mail servers.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Game and Software Keys ===&lt;br /&gt;
Game and software keys can cost hundreds and thousands of dollars. Botnets have been working on getting those keys though &amp;quot;brute-force social engineering&amp;quot;. A lot of users today still write files like with name &amp;quot;word-key.txt&amp;quot;, &amp;quot;photoshop_key.doc&amp;quot;, etc. Though files with simple names as such, Bot Herders managed to obtain key from many software application.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Id Theft ===&lt;br /&gt;
As the introduction mentioned, information is the most valuable resource of our new century. By stealing an Id from someone in the FBI, military or special service, anyone can obtain resourceful information that can be used, go public on news or maybe even sold for malicious military strategy purposes.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== KeyLoggers ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/A-million-zombies-threaten-US-national-security/0,339028227,339278685,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T16:44:55Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Some Botnets add a layer of complexity by using a hidden “Proxys” though where the IRC commands will be sent, or though a series of &amp;quot;hops&amp;quot;. This layers make the crackers hide evidences that could lead to the discovery of the Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A file such as .bat, that execute network commands can be modified to deactivate applications such as anti-virus systems or to kill processes associated to any security application. Other bots execute processes that substitute normal programs files of anti-virus to others that make the program look normal or even modify references to the download of corrupted patches that malicious codes will be download and executed on the compromised machine.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the father of the Internet, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Profitable? How?? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T16:26:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the father of the Internet, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Profitable? How?? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
[[Image:http://en.wikipedia.org/wiki/File:Zombie-process.svg|thumb|right|200px|Using a botnet to send spam]]&lt;br /&gt;
&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T16:25:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Who's out there for us??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the father of the Internet, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Profitable? How?? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
[[http://en.wikipedia.org/wiki/File:Zombie-process.svg]]&lt;br /&gt;
[[Image:Zombie-process.svg|thumb|right|200px|Using a botnet to send spam]]&lt;br /&gt;
&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://pt.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Botnet&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://howto.wired.com/wiki/Build_your_own_botnet_with_open_source_software&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/tag/attack-botnet-denial_of_service.htm&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T16:13:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Why should I worry?? Is there anything being done by someone to prevent and stop this??? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day. To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview on March 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force since May 2006.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Vint Cerf ===&lt;br /&gt;
On September 2007, the father of the Internet, Vint Cerf, has warned attendees of the the World Economic Forum in Davos-Switzerland that the Internet is at serious risk from Botnets. Vast networks of compromised PCs, used by criminals for sending spam and spyware and for launching denial of service attacks, are reported to be growing at an alarming rate and now Cerf has warned they could undermine the future of the Internet by comparing the threat to a pandemic disease.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment after the research was released in September 2008.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Profitable? How?? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
http://www.builderau.com.au/news/soa/Facebook-botnet-risk-revealed/0,339028227,339291847,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Sun-Grid-hit-by-network-attack/0,339028227,339243901,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.builderau.com.au/news/soa/Escalating-DoS-attacks-may-shut-down-the-Internet-/0,339028227,339282392,00.htm?feed=pt_denial_of_service&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T15:52:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? Is there anything being done by someone to prevent and stop this?? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006, Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to literally reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Microsoft ===&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day, the company said on Wednesday.&lt;br /&gt;
To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Profit? How?? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T15:46:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? ==&lt;br /&gt;
=== Symantec ===&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== McAfee ===&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== VeriSign ===&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== International Botnet Task Force ===&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Sun Microsystems' Grid ===&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day, the company said on Wednesday.&lt;br /&gt;
To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T15:42:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how a human-machine assist application went from being a simple and helpful code to a complex distributed network threat:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is this problem anyways? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Denial-of-service attacks are growing faster than bandwidth is being added to the Internet, according to VeriSign, the company that administers the .com domain. The company claimed that a successful denial-of-service (DoS) attack against VeriSign could bring down the Internet. &amp;quot;There are attacks attempting to shut down our servers,&amp;quot; said Ken Silva, VeriSign's chief security officer. &amp;quot;This would effectively shut down the Internet.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More than a million PCs under the control of spammers are threatening the US national security, its economy and its information infrastructure, according to the FBI.&lt;br /&gt;
The discovery was made by Operation Bot Roast, which is an initiative aimed at revealing the scale of the Botnet problem and prosecuting those responsible. It is being carried out in conjunction with Carnegie Mellon University, Microsoft and the International Botnet Task Force.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sun Microsystems' Grid, a publicly available computing service, was hit by a denial-of-service network attack on its inaugural day, the company said on Wednesday.&lt;br /&gt;
To let people try out the Sun Grid, the company made a text-to-speech translation service publicly accessible for, for example, turning blog entries into podcasts. &amp;quot;It became the focus of a denial of service attack,&amp;quot; said Aisling MacRunnels, Sun's senior director of utility computing said in an interview.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Researchers have created a proof-of-concept application for Facebook that turned the machines of people who added the app to their Facebook page into elements of a Botnet that in a demonstration launched denial-of-service attacks on a victim server. &amp;quot;Social Network websites have the ideal properties to become attack platforms,&amp;quot; according to a paper entitled &amp;quot;Antisocial Networks:Turning a Social Network into a Botnet,&amp;quot; that was authored by five researchers from the Institute of Computer Science in Greece and one from the Institute for Infocomm Research in Singapore. The demo application, called &amp;quot;Photo of the Day,&amp;quot; displays a new photo from National Geographic every day. However, every time someone views the photo, the host computer is forced &amp;quot;to serve a request of 600 Kbytes,&amp;quot; according to the paper. Such a Botnet could be used for other types of attacks, such as spreading Malware, scanning computers for open ports, and overriding authentication mechanisms that are based on cookies, the paper warned.&lt;br /&gt;
The researchers suggested that Facebook and other social networks be careful in designing their platform and application programming interfaces (APIs) so that there are few interactions between the &amp;quot;social utilities they operate and the rest of the Internet.&amp;quot; However, Facebook representatives did not return e-mails seeking comment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T00:36:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how an human-machine assist application went from being a simple code to &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T00:16:25Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Backdoors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how an human-machine assist application went from being a simple code to &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-10T23:48:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Backdoors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious overtones. Bots were originally developed as a virtual individual&lt;br /&gt;
that could sit on an IRC channel and do things for its owner while the owner was busy elsewhere.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Evolution Time&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered first worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven trojan/bot A remote control trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot, written in C++ Source code available to hacker community Small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot Introduces modular design 1st module break-sin downloads 2nd module 2nd module turns off anti virus Hides from detection, downloads 3rd module. Module 3 has attack engines/payloa&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot Spyware capabilities (keylogging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot Most Prevalent Bot today Spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-10T23:41:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Backdoors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious overtones. Bots were originally developed as a virtual individual&lt;br /&gt;
that could sit on an IRC channel and do things for its owner while the owner was busy elsewhere. IRC was invented in August of 1988 by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Evolution Time&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-10T23:15:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Backdoors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Botnet? What is it?? How it work??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which actually means that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-10T05:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine through its running processes (Most likely machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS), behaves like a “worm” process capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool that are used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain information from uses, or also, to integrate these Bot Clients to a much greater threat and risk, such as the Botnets.&lt;br /&gt;
 &lt;br /&gt;
== Botnet? What is it?? How it work? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots, which are used for invasion of the clients are also being protected by their Bot Headers, and this integrate this invasion technique into a more powerful and a sophisticated way of a mass invasion of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. On the next sections, this article will focus on what measurements are being taken to control this terrible plague that is in some SPN's(Simple Private Networks) thoughout our internet. We have to detain this threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality on a network.&lt;br /&gt;
&lt;br /&gt;
*Bot&lt;br /&gt;
*Bot Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Botnets</id>
		<title>Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Botnets"/>
				<updated>2009-04-10T03:37:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;Botnets moved to Bots &amp;amp; Botnets&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Bots &amp;amp; Botnets]]&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-10T03:37:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rosard:&amp;#32;Botnets moved to Bots &amp;amp; Botnets&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>Rosard</name></author>	</entry>

	</feed>