427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet173/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   169   170   171   172   173   174   175   176   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
212
Chapter 5 • Botnet Detection: Tools and Techniques
427_Botnet_05.qxd 1/9/07 9:59 AM Page 212


of a security breach, they give you an immediate start on
investigating what’s happened.
Q: 
Why ports 135-139 and port 445? Are you picking on Microsoft?
A: 
Yes, we are picking on Microsoft. In fact, historically for some reason dis-
tributed file systems have never been something you wanted to make
accessible via the Internet. Sun has had its problems with its Network File
System. However, in recent years many botnets have included exploits
explicitly targeting the Microsoft File Share system. In part this is due to
popularity and high usage; in part it’s due to numerous exploits (and lack
of patching).
Q: 
Are there other ports I need to watch?
A: 
Bots and other malware can often use any port (which is why you can’t
just stop IRC bots by blocking IRC ports), but they are often character-
ized by the use of a specific port. A number of Web resources list specific
threats by port, but you shouldn’t rely on their being 100 percent accu-
rate, comprehensive, and up to date.Try Googling 
bot ports
or 
Trojan ports
.
The threat analysis reports from Joe Stewart on www.LURHQ.com, now
merged with SecureWorks, are a great source of information on ports and
bot behavior.
Q: 
Is it possible for a switch in one location to port-mirror packets to a
switch in another location?
A: 
Yes. Cisco switches might have a feature called RSPAN, which can allow
this trick.
www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
213
Frequently Asked Questions
The following Frequently Asked Questions, answered by the authors of this
book, are designed to both measure your understanding of the concepts pre-
sented in this chapter and to assist you with real-life implementation of these
concepts. To have your questions about this chapter answered by the author,
browse to 

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   169   170   171   172   173   174   175   176   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish