427 Botnet fm qxd


part of the botnet) mail servers configured to act as relays or open proxies



Download 6,98 Mb.
Pdf ko'rish
bet346/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   342   343   344   345   346   347   348   349   ...   387
Bog'liq
Botnets - The killer web applications


part of the botnet) mail servers configured to act as relays or open proxies.
Botnet clients need to live on networks that permit the command and con-
trol protocol through their firewalls and IDS/IPS, or the command and con-
trol must be flexible and designed to operate using multiple protocols and
applications. In a recent R-bot infestation, we found copies of Dameware,
Carbon Copy, and VNC, all useful as remote administration tools, on different
botnet clients within the botnet.
www.syngress.com
Responding to Botnets • Chapter 12
421
427_Botnet_12.qxd 1/9/07 3:08 PM Page 421


The products chosen need a large and reachable customer population. It
is, after all, a numbers game.The spammers count on getting a certain number
of customers out of every run. In the case cited previously, the spammers only
needed one sale out of every 30,000 to make a good profit.The customers
must want to buy the products via this unusual medium. In this case, the
motivation could be embarrassment or cost. In the case of pump and dump
stocks, the motivation is greed. Note, too, that the spam needs to get by many
(but not all) of the anti-spam filtering techniques.
Ironically, some large ISPs have begun to provide anti-spam software or
services due to the demand of their customer base.This is a case where the
spammers may have been their own worst enemy. By not exercising constraint
(which is not in their nature), they have caused ISPs to respond to keep cus-
tomers from changing to other ISPs.
Spammers prefer to find an organization that permits individual com-
puters to send SMTP outbound as opposed to sending it through a local
SMTP server where it might be checked for spam.They also prefer organiza-
tions that do not keep statistics, such as top outbound mail senders, and so
forth. Organizations that permit inactive accounts to stay open are also targets
for spam sending botnets. Botnet herders can pound away at these inactive
accounts trying to guess their passwords since there is no one using the
account to notice. Large organizations with many inactive accounts and large
amounts of user rollover, like universities, are a prime target.These accounts
can be on both UNIX and PC systems, since mail is ubiquitous.
For phishing and pharming attacks, the target is personal information,
financial information, credit card numbers, and access to financial Web
accounts (for piggybacking).There are three components to the phishing
attack. First, you have to herd the victims to your collection sites. For this, the
phisherman could use a botnet in much the same fashion as the spammers.
This spam would look like e-mails from banks or other financial institutions.
You could also use pharming techniques. For pharming, the botherder targets
local DNS, either on a PC host directly or by a targeted attack on the local
DNS servers.Taking over DNS in toto is an awesome venue for man-in-the-
middle attacks. Now the phishing site needs to masquerade as the real site.
Many do this by using images that were extracted from a real financial or
business site.The herding activities discussed are all technical elements of a
social engineering attack.The attack depends on the user being unable to

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   342   343   344   345   346   347   348   349   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish