Bots and Malware: by Amy Farina
Bots and Malware: by Amy Farina
by Amy Farina
1.
1. What
What are
arebots,
bots,botnets,
botnets, botmasters/herders,
botmasters/herders, etc?
etc?
2.
2. How
Howcan
canthey
theybe
bedetected?
detected?
3.
3. How
Howthey
theyhave
haveevolved
evolved over
over time
time
4.
4.Conclusion
Conclusion
What is a bot / botnet?
• A bot is a term used to describe an
automated ‘robot’ process but is also
commonly used to describe a
compromised host (aka, zombie, drone)
• A botnet is a network of compromised
computers controlled by a botmaster/
botherder/controller. Bot armies can be
hundreds to thousands of compromised
machines
Background Info/Definitions
• Host control mechanisms
• Traditional propagation
• Bagle scanner: scans for back doors left by Bagle variants on port 2745.
• Dcom scanners (1/2): scans for the well known DCE-RPC buffer
overflow.
• MyDoom scanner: scans for back doors left by variants of the MyDoom
worm on port 3127.
• Dameware scanner: scans for vulnerable versions of the Dameware
network administration tool.
• NetBIOS scanner: brute force password scanning for open NetBIOS
shares.
• Radmin scanner: scans for the Radmin buffer overflow.
• MS-SQL scanner: brute force password scanning for open SQL servers.
• Generic DDoS module: enables seven types of denial service attack
against a targeted host
IRC BOTS: sdbot, spybot, gtbot
• SDBot does not have any exploits packaged in
its standard distribution. There are, however,
numerous variants that include specific exploits.
• Spybot only includes attacks on NetBIOS open
shares. However, as with SDBot, there are many
variants that include a wide range of exploits.
• The exploit set for the GTBot code was
developed to include RPC-DCOM exploits. Like
SDBot and Spybot, there are many variants of
GT Bot that include other well known exploits.
How to detect IRC bots?
• If use of a standardized protocol like IRC is used then
detection can be easier.
4 Main
Web Server
Security
Browser Third-Party
Exploits Widgets
User
contributed
content
Their purpose and findings
• How does malware take advantage of
browser vulnerabilities & install binaries on
users’ computers?
Botnet Exploits
NJIT: IT-485
Digital Forensics