427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet371/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   367   368   369   370   371   372   373   374   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
448
Chapter 12 • Responding to Botnets
427_Botnet_12.qxd 1/9/07 3:08 PM Page 448


card encoding, and botnets won’t be nearly as lucrative a business
proposition for cashers.
Phishing attacks based on social engineering via fake Web pages, and
pharming attacks based on rewiring the DNS to send naïve users to
new fake Web sites, are an important part of the botnet scene.
The complexity of software and distributed systems is a hard
problem.This means it is easy for a hacker to find an exploit, and
hard for defenders to defend against all possible exploits.
Fundamental security policies are often ignored. For example,
passwords may be weak or nonexistent on highly privileged accounts.
Many attacks include password guessing as one of the threat
elements. Software that requires a user to have local admin privileges
to operate, giving out local admin accounts to anyone who wants
one, and using local admin accounts for day-to-day use increase the
odds that a computer will become a botnet.
Many attacks are old and simply rely on the existence of unpatched
(Windows) systems. Windows is not the only guilty party, though, as
other systems can go unpatched as well.
Policies that allow anyone to create Web pages without any
requirement for security, security standards compliance, or even
security review threaten both Windows- and UNIX-based systems.
Creating Web pages for all users, even if they never intend to use
them, creates piles of treasure for the new phisher.The hosting
platform of choice for phishers today is overwhelmingly UNIX-
based systems running Apache.
What Is to Be Done?
Improve local security policy authentication practices to help prevent
password-guessing attacks.This includes sane account management
practices.
Use firewalls and other containment technologies (even NAT!) to
limit the scope of attacks.
Windows systems need to be updated. All other systems need to be
updated, too. Beware turning off auto updates. Remember from

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   367   368   369   370   371   372   373   374   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish