427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet26/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   22   23   24   25   26   27   28   29   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnets: A Call to Action • Chapter 1
11
427_Bot_01.qxd 1/8/07 11:53 AM Page 11


note of family names like Spybot, MyTob, and Polybot. While MyTob does
indicate a code base, it is also a new characteristic, the mass mailing bot that
happens to be based on MyDoom. Similarly, detections by antivirus (A/V)
vendors are becoming less concerned with identifying the overall bot. Instead,
they are tagging components they find with functional identifiers. Symantec,
for example, tags individual components it finds with names like
Hacktool.HideWindow and Trojan.Dropper.The overall bot was an RBot,
but Symantec never identified that connection.To the A/V vendor, they’ve
done their job if they find the malicious code and deal with it. However, the
corporate security officer would really like to know more.The organizing
schema for the bot tells the security officer what potential attack vectors were
used to infect the computer so that they might plug the holes instead of just
fixing the broken machines.
Each of the original bot families has evolved to incorporate improvements
that are seen in other bots. Since many of the bots are open source, modular,
and in C/C++, it is easy to take source from one bot and add its capabilities
to another bot.There is also a tendency for the A/V companies to use the
names that they designated to the exclusion of other vendor-created names.
Partially, this is because there are so many variants of each bot family that two
bots in the same family can have significantly different capabilities. For
example, one variant may use IRC as its C&C and have keylogging capabili-
ties, while the other variant may use P2P networks for C&C and search its
botclients for PGP public and private keys, cached passwords, and financial
account information. One vendor may call them both variants while another
may tag one of the variants as a new family.
New family names from this point have tended to highlight a new 
capability.
Spybot
Spybot is an open source Trojan, a derivative of SDBot. It has also been called
Milkit. Spybot emerged in 2003. Spybot adds spyware capabilities, such as col-
lecting logs of activity, data from Web forms, lists of e-mail addresses, and lists
of visited URLs. In addition to spreading via file sharing applications (PnP
apps) and by exploiting known vulnerabilities, Spybot also looks for systems
that were previously compromised by the SubSeven or the Kuang2 Trojan.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   22   23   24   25   26   27   28   29   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish