Module 03 - BotNet
Module 03 - BotNet
Botnets
Botnet Threat
Botnets are a major threat to the Internet because:
Consist of a large pool of compromised computers that are
organized by a master.
a.k.a., Zombie Armies
Market Wealth
S
SS
Buy, Sell, & Trade
4
Sensitive Data and Market
Significance
Percentage of Labeled Credit Card #s
SSNsAccount #s
Bank
Data
Sensitive Data
Type
5
Botnet Architecture
Botmaster
Bot Bot
Bot
Recruiting Recruiting
Recruiting
Botnet Taxonomy
A taxonomy model is necessary to develop the intelligence to
identify, detect, and mitigate the risk of an attack.
Classification Scheme
Attacking Behavior
C&C Models
Rally Mechanisms
Communication Protocols
Observable botnet activities
Evasion Techniques
Attacking Behaviors
Infecting new hosts
Social engineering and distribution of malicious emails or other
electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless
attachment.
Stealing personal information
Keylogger and Network sniffer technology used on compromised
systems to spy on users and compile personal information
Phishing and spam proxy
Aggregated computing power and proxy capability make allow
spammers to impact larger groups without being traced.
Distributed Denial of Service (DDoS)
Impair or eliminate availability of a network to extort or disrupt
business
Command and Control (C&C)
Essential for operation and support of botnet
3 Styles – Centralized, P2P and Randomized
Weakest link of the botnet because:
Elimination of botmaster takes out the botnet
High level of activity by botmaster makes them
easier to detect than their bots
C&C Centralized Model
Advantage: Simple to deploy, cheap, short latency for
large scale attacks
Disadvantage: Easiest to eliminate
C&C Centralized Model
Example
3 Steps of
Authentication
Bot to IRC
Server
IRC Server to
Bot
Botmaster to
Bot
Storm
Node
Rallying Mechanisms
Hard-coded IP address
The bot communicates using C&C ip addresses that are
hard-coded in it’s binary files.
Easy to defend against, as ip addresses are easily
detectable and blocked, which makes the bot useless.
Rallying Mechanisms
Dynamic IP address with DNS domain name resolution
Hard-coded C&C domains names.
Detection harder when botmaster randomly changes the
mapped IP address
If connection fails the bot performs DNS queries to obtain
the new C&C address for redirection.
Rallying Mechanisms
Distributed DNS Service
Hardest to detect & destroy. Newest mechanism.
Sophisticated.
Botnets run own DNS service out of reach of authorities
Bots use the DNS addresses to resolve the C&C servers
Use high port numbers to avoid detection by security
devices and gateways
Communication Protocols
In most cases botnets use well defined and accepted
Communication Protocols. Understanding the
communication protocols used helps to:
Determine the origins of a botnet attack and the software
being used
Allow researchers to decode conversations happening
between the bots and the masters
Techniques
Executable packers
Rootkits
Protocols
Evasion Techniques
Moving away from IRC
Taking control of
HTTP
VoIP
IPV6
ICMP
Skype protocols
Evasion Techniques
Skype, the best botnet ever??
Very popular, 9M+ users, average 4M+ connected
Bootstrapping Peer
Round 1
Round 4
Round 2
Overnet Message Passing:
Overnet has three basic message types to facilitate proper function of the
network:
Connect:
A peer uses connect messages to report their OID to other peers and
to receive a list of peers somewhat close to the peer.
Search:
A peer uses search messages to find resources and other nodes
based on OID.
Publicize:
A peer uses publicize messages to report ownership of network
resources (OIDs) so that other peers can find the resource later.
Random Mechanisms
Theoretical architecture: Evan Cooke, et al describe the model
Easy implementation and resilient to discovery and destruction
Scalability limitations make it impractical for large scale attacks.
Bots sleep and are not activated until Bot Master is ready to
attack