427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet125/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   121   122   123   124   125   126   127   128   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
152
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 152


(http://blogs.msdn.com/larryosterman/archive/2006/02/02/523259.aspx),
Larry Osterman took a rather humorous slant on this in comparing a DMZ
firewall to the French Maginot Line in World War II.The French built a great
defense wall to keep the Germans out. Unfortunately, the Germans simply
drove north around it.The lesson is that it is reasonable to consider defense in
depth for hosts within a firewall enclave.These techniques can include host
firewalls and cryptographic protocols.They can also include Layer 2 tech-
niques as one more form of defense in depth.The good news about Layer 2
techniques is that they are not per host but can be centrally administered by a
network engineer.
Malware spread via botnets or other means could choose to launch
attacks, including:

ARP spoofing
This is especially useful in the case where an
attacking host on a local subnet chooses to masquerade as the router
to allow it to view or change packets from the attacked host to the
rest of the network.

Switch table flooding with the common goal of password
sniffing
Put another way, the defeat of traditional Unicast segmenta-
tion in an Ethernet switch means that the host running the packet
sniffer might be able to see packets (especially plain-text passwords)
that it might not otherwise be able to observe.

DHCP attacks
For example, an attacking system might simply
intercept DHCP requests and substitute itself as the local router. In
addition to ARP spoofing, this could be another form of MITM
attack.
This is not an exhaustive list of Layer 2 attacks, but we will confine our-
selves to this list for the time being, since the first two scenarios are more
common in our experience.
So, do the good guys have any tricks up their sleeves? Yes, a few.The tricks
can be divided into two categories: switch configuration, which must rely on
vendor features, and infrastructure tricks, which hopefully can be done by any
network engineer with most hardware.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   121   122   123   124   125   126   127   128   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish