Know your Enemy: Tracking Botnets

21
Know your Enemy: Tracking Botnets The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle

description

Know your Enemy: Tracking Botnets. The Honeynet Project & Research Alliance Presented by: Jonathan Dowdle. Motivation. To study the activities of BotNets and their owners. What a Botnet is Not. Introduction. What is a BotNet? What is a HoneyNet? Who are the victims? - PowerPoint PPT Presentation

Transcript of Know your Enemy: Tracking Botnets

Page 1: Know your Enemy: Tracking Botnets

Know your Enemy: Tracking Botnets

The Honeynet Project & Research Alliance

Presented by: Jonathan Dowdle

Page 2: Know your Enemy: Tracking Botnets

Motivation

• To study the activities of BotNets and their owners

Page 3: Know your Enemy: Tracking Botnets

What a Botnet is Not

Page 4: Know your Enemy: Tracking Botnets

Introduction

• What is a BotNet?

• What is a HoneyNet?

• Who are the victims?

• What vulnerabilities are used?

• What can a BotNet be used for?

Page 5: Know your Enemy: Tracking Botnets

HoneyNet

LAN

Internet

Honeywall

Management

`

Windows Honeypots

``

``

Page 6: Know your Enemy: Tracking Botnets

BotNet

bot

bot

`

bot

`

bot

`

bot

`

botInternet

IRC Server

Page 7: Know your Enemy: Tracking Botnets

Method

• Setup – HoneyNet of 3 machines

• Analysis– mwcollectd2– drone

Page 8: Know your Enemy: Tracking Botnets

Uses of Botnets

• DDoS (Distributed Denial of Service) Attack• Spamming• Sniffing Traffic• Keylogging• Spreading Malware• Google AdSense Abuse• Attacking IRC Networks (similar to DDoS)• Manipulating online polls/games• Mass identity theft

Page 9: Know your Enemy: Tracking Botnets

Types of Bots

• Most common bots– Agobot / Phatbot / Forbot / XtremBot– SDBot / RBot / UrBot / UrXBot– GT-Bots

• Less common bots– DSNX Bots– Q8 Bots– kaiten– Perl-based bots

Page 10: Know your Enemy: Tracking Botnets

How Bots Work

FTPTFTPHTTP

INTERNET

Exploited Client

Master IRC ServerExploited Client

w/ Bot client

Bot is downloaded from

Internet

Bot connects to IRC server

Page 11: Know your Enemy: Tracking Botnets

How Bots WorkStart

Join IRC Server

Join master’s channel

Topic a command?

Execute commandYES Output?

NO

NO

YESMessage master

Page 12: Know your Enemy: Tracking Botnets

The Server

• Unreal IRCd

• ConferenceRoom

Page 13: Know your Enemy: Tracking Botnets

HoneyNet

LAN

Internet

Honeywall

Management

`

Windows Honeypots

``

``

Page 14: Know your Enemy: Tracking Botnets

Tracking Botnets

• IRC login information is sniffed when bot on Honeypot connects

• Using login information gathered we can connect to master IRC server

Page 15: Know your Enemy: Tracking Botnets

Tracking Botnets -- Observing

• Commands from master can be observed in channel

• Custom IRC client is usually needed

Page 16: Know your Enemy: Tracking Botnets

Custom IRC Client

• drone

Page 17: Know your Enemy: Tracking Botnets

Lessons Learned

• Number of botnets– 100 botnets over 4 months– 35 “live” botnets as of paper’s publish date

• Number of hosts– ~220,000 unique IP addresses joining at least

one of the monitored channels• The number may be larger due to some hosts not

showing joining clients into a channel

Page 18: Know your Enemy: Tracking Botnets

Lessons Learned Cont.

• Typical Size of Botnets– 100s – up to 50,000 hosts

• Dimension of DDoS-attacks– 226 DDoS-attacks against 99 unique targets

Page 19: Know your Enemy: Tracking Botnets

Strengths

• Moderate learning curve– Paper is presented in ordinary language

• Novel method of determining methods and attacks used by Botnet owners

Page 20: Know your Enemy: Tracking Botnets

Weaknesses

• Focuses only IRC-based bots

• More data could have been provided

Page 21: Know your Enemy: Tracking Botnets

Further Research

• Vulnerability modules

• Shellcode parsing modules

• Fetch modules