427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet372/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   368   369   370   371   372   373   374   375   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Responding to Botnets • Chapter 12
449
427_Botnet_12.qxd 1/9/07 3:08 PM Page 449


Microsoft Patch Tuesday to the first exploit is down to three days as
of December 2006. Don’t forget to verify that all systems have
accepted and installed the patches.
Every Windows host needs a virus checker and possibly a spyware or
adware checker.
Every host should have a firewall. User host firewalls that can actively
warn you about host network perimeter trespasses seem like a very
good idea indeed.
Obviously, malware should be taken off the Net and cleaned up.
However, you may want to first consider putting tcpview or a sniffer
on it and learning if other local hosts are involved.You may also be
able to learn about remote hosts that may be the botnet C&C. Send
a copy of malware that is found on infected systems to one of the
CWSandbox sites to learn what it does and who it talks to upon
installation.
Send abuse e-mail about remote attacks.You may be doing some
poor remote user a great favor (or you may be ignored).
Law enforcement may be invoked, especially if the incident is
considered very serious for legal or financial reasons.
Darknets, honeynets, honeypot tools, and sandboxes are all useful for
determining what is going on in botnet-land.
Shadowserver (www.shadowserver.org) is an all-volunteer group that
tracks and reports on botnets and other malware.They recommend
Nepenthes for collection of malware (see http://nepenthes.
mwcollect.org).
Require all outbound mail to go through official mail servers to
prevent botclients from spamming directly to the Internet.
Use networking equipment that supports port security to detect
DHCP, IP address, and ARP spoofing.
Develop your sources of internal intelligence. Work with operations
to ensure that you have the time to gather intelligence from infected
machines before they are re-imaged and put back in service.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   368   369   370   371   372   373   374   375   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish