Your SlideShare is downloading. ×
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Bots and Botnet
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Bots and Botnet

239

Published on

Bots and Botnet are the biggest threat of internet. Various attacks have been launched using this.

Bots and Botnet are the biggest threat of internet. Various attacks have been launched using this.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
239
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Bot and Botnets By : Sitanshu Dubey Security analyst and researcher Hicube Infosec Pvt. Ltd. E-mail: sitanshu@hicubes.com
  • 2. Session Flowo Introductiono Type of Attackso History of Botneto Type of Botneto Workingo Some Statso Preventiono Conclusion
  • 3. Introductiono Bots : Bots are short form of ‘robots’ which works on commands given by the Administrator. Here bots are refer to malware infected computers which is controlled by a hacker.
  • 4. Introductiono Botnet : Botnet is a network of infected computers which works on commands issued by attackers. OR Botnet is a group of bots which is controlled by an attacker.
  • 5. Type of Attackso DDoS Attackso Spammingo Key Loggingo Identity Thefto Phishingo Click Fraudo Distribution of Malwares (Spyware/Adware)
  • 6. History of Botneto Originally used in IRC as a way to allow automated tasks to be done.o Eventually evolved into a way to automate malicious tasks.o Started with DoS/DDoS against servers. TFN, stacheldraht, trinoo (1999)
  • 7. Types of Botneto IRC Based Botnet :o HTTP Based Botnet:o P2P Based Botnet:
  • 8. Working1. Worm/Trojan programthats usually transmittedthrough a spam.
  • 9. Working1. Worm/Trojan programthats usually transmittedthrough a spam. 2. Bot connects to IRC C&C channel
  • 10. Working3. Botmaster sendscommands through IRCC&C channel to bots
  • 11. Working4. Repeat. Soon thebotmaster has an armyof bots to control froma single point
  • 12. Some Statso DDoS attack on an Asian e-commerce company in Nov. 2011o According to security company Prolexic it was the largest DDoS attacks in 2011o The 15,000 requests per second were performed by a botnet of 250,000 PCs in total, which together peaked at 45Gbps DDoS traffic.
  • 13. Some Statso The DDoS attack was launched against Spamhaus , an organization that stops spam emails from getting to people’s inboxes, apparently by one or more of groups whose spam was being targeted, on 26 March 2013.o It is the Biggest Cyber Threat till the date.
  • 14. ExamplesSome popular loaders are here:o Zeus Bot (Http Based)o VertexNet (Http Based)o SpyEye (Http Based)o GT Bot (IRC Based)
  • 15. Preventiono Using anti-virus and anti-spyware software and keeping it up to date.o Using a firewall to protect your computer from hacking attacks while it is connected to the Internet.o Setting your operating system software to download and install security patches automatically.o Being cautious about opening any attachments or downloading files from emails you receive.
  • 16. Conclusiono Attacker remains anonymous and hard to trace.o Used in many malicious activity.o It’s a biggest threat of internet.o Works automatically and autonomously

×