SlideShare ist ein Scribd-Unternehmen logo
1 von 9
BOTLAB
By: Anthony W. Stamm
What is a BOTNET?
• A botnet is a collection of infected computers that have been infected with a virus
to bring them under the control of one single hacker or organization.
• This ability to control a large botnet gives hackers and cybercriminals the ability
to send billions of spam emails, or orchestrate massive DDOS attacks at will.
• A single Bot program is normally very weak unless spread across more
computers.
• Botnets are designed to harvest data such as passwords, Social Security numbers,
credit card numbers, addresses, telephone numbers and other personal
information.
• A Botnet can have anywhere from a few hundred to thousands of devices at their
disposal.
What Are Botnets used For?
• Keylogging
A DDoS attack is an attack on the computers system or network that is usually focused on consuming the
networks bandwidth and overloading the computational resources of the victims system
Spamming is when an attacker is able to send massive amounts of bulk email (spam). Some bots also implement a
special function to harvest email-addresses. Often that spam you are receiving was sent from, or proxied through, a
family member’s old Windows computer sitting at home.
• Spamming
• Distributed Denial-of-Service Attacks (DDoS)
With the help of a keylogger it is very easy for an attacker to retrieve sensitive information. An implemented filtering
mechanism (e.g. "I am only interested in key sequences near the keyword 'usaa.com'") would further helps in
stealing secret data.
BOTNET ARCHITECTURE
Client–server
• A network based on the client-server
model, where individual clients
request services and resources from
centralized servers
• Star topology, in which the bots are
organized around a central server.
• Multi-server, in which there are
multiple C&C servers for redundancy.
• Hierarchical, in which multiple C&C
servers that are organized into tiered
groups.
BOTNET ARCHITECTURE
Peer-To-Peer (P2P)
• botnets have a random organization
and operate without a C&C server.
Bot software maintains a list of
trusted computers
• The lack of a command-and-control
server makes it less likely that
detection of a single bot can lead to
investigators taking down the entire
network.
• The work is distributed between
many nodes, allowing them to shift to
another node if one is taken down.
• Any node in the network can act as
both a client and a server.
Social Media
Hackers can use such aspects like Facebook in
order to spread the Botnets across the world
much like in 2013 where a Botnet called
Lecpetex which infected over 50,000
personal computers.
Hackers
Target
Host
Computer
Who's spamming us now?
• Websites like http://botlab.org/ are used in finding and tracking the current Bot
activity throughout the world.
The top three countries that experience the most spam volume are:
• India with 10.49% spam volume.
• USA with 7.69% spam volume
• Vietnam with 6.01% and increasing
The top three countries that experience the most Bot IPs volume are:
• India
• Brazil
• Russia
Protective Mindset
02
01
03
04
ANTI-VIRUS
Remember to keep it updated
FIREWALL
and other security software helps protect
ones system
Attachments
Scan and verify every attachment before
opening them
Mobile Devices
Are also at risk and can be used as Bots
YOU
THANK
FOR WATCHING

Weitere ähnliche Inhalte

Was ist angesagt?

Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Atlantic Security Conference
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation methodAcad
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysisinder_barara
 
Social engineering
Social engineeringSocial engineering
Social engineeringlokenra
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysisidescitation
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about BotnetNaveen Titare
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Aaron Lancaster
 

Was ist angesagt? (20)

Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
about botnets
about botnetsabout botnets
about botnets
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Botnet
BotnetBotnet
Botnet
 
Botnet
Botnet Botnet
Botnet
 
Important Notes
Important NotesImportant Notes
Important Notes
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Bots and Botnet
Bots and BotnetBots and Botnet
Bots and Botnet
 
Ransomware
RansomwareRansomware
Ransomware
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Malwares
MalwaresMalwares
Malwares
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
Virus
VirusVirus
Virus
 
Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?Why are you still getting CryptoLocker?
Why are you still getting CryptoLocker?
 

Andere mochten auch

Black Rock Consulting - January 2010
Black Rock Consulting - January 2010Black Rock Consulting - January 2010
Black Rock Consulting - January 2010BlackRockConsulting
 
Multi domain hosting
Multi domain hostingMulti domain hosting
Multi domain hostingnor_nilam
 
E sense organic- plug and play wireless lighting controls
E sense organic- plug and play wireless lighting controlsE sense organic- plug and play wireless lighting controls
E sense organic- plug and play wireless lighting controlsFagerhult Lighting
 
El ahorro energético
El ahorro energéticoEl ahorro energético
El ahorro energéticoGenaro Chay
 
Nt estrategia empresarial
Nt estrategia empresarialNt estrategia empresarial
Nt estrategia empresarialCarlota de Dios
 
Se busca practicante para organización de desarrollo
Se busca practicante para organización de desarrolloSe busca practicante para organización de desarrollo
Se busca practicante para organización de desarrolloviSozial
 
Findings of Fact / Damages Award
Findings of Fact / Damages AwardFindings of Fact / Damages Award
Findings of Fact / Damages AwardSal Ferguson
 
Big Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- SatnamBig Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- SatnamSatnam Singh
 
Castilla en época de isabel i corregido 2
Castilla en época de isabel i corregido 2Castilla en época de isabel i corregido 2
Castilla en época de isabel i corregido 2Marc Soto
 
Peanuts: Organic Production
Peanuts: Organic ProductionPeanuts: Organic Production
Peanuts: Organic ProductionElisaMendelsohn
 
KLT LED Lighting Introduction
KLT LED Lighting IntroductionKLT LED Lighting Introduction
KLT LED Lighting Introductionkenleylau
 
whirlpool Annual Report2001
whirlpool Annual Report2001whirlpool Annual Report2001
whirlpool Annual Report2001finance13
 
The Hunar Foundation's Presentation 2014
The Hunar Foundation's Presentation 2014The Hunar Foundation's Presentation 2014
The Hunar Foundation's Presentation 2014hunarfoundation
 

Andere mochten auch (20)

Black Rock Consulting - January 2010
Black Rock Consulting - January 2010Black Rock Consulting - January 2010
Black Rock Consulting - January 2010
 
Multi domain hosting
Multi domain hostingMulti domain hosting
Multi domain hosting
 
Portafolio Digital ElProfeMesa
Portafolio Digital  ElProfeMesaPortafolio Digital  ElProfeMesa
Portafolio Digital ElProfeMesa
 
E sense organic- plug and play wireless lighting controls
E sense organic- plug and play wireless lighting controlsE sense organic- plug and play wireless lighting controls
E sense organic- plug and play wireless lighting controls
 
El ahorro energético
El ahorro energéticoEl ahorro energético
El ahorro energético
 
11 de julio del 2014
11 de julio del 201411 de julio del 2014
11 de julio del 2014
 
Nt estrategia empresarial
Nt estrategia empresarialNt estrategia empresarial
Nt estrategia empresarial
 
Se busca practicante para organización de desarrollo
Se busca practicante para organización de desarrolloSe busca practicante para organización de desarrollo
Se busca practicante para organización de desarrollo
 
Xau mgf
Xau   mgfXau   mgf
Xau mgf
 
Findings of Fact / Damages Award
Findings of Fact / Damages AwardFindings of Fact / Damages Award
Findings of Fact / Damages Award
 
Big Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- SatnamBig Data Analytics Insights Conference- Satnam
Big Data Analytics Insights Conference- Satnam
 
Catálogo de CEVAGRAF - Tu imprenta online de confianza
Catálogo de CEVAGRAF - Tu imprenta online de confianzaCatálogo de CEVAGRAF - Tu imprenta online de confianza
Catálogo de CEVAGRAF - Tu imprenta online de confianza
 
Castilla en época de isabel i corregido 2
Castilla en época de isabel i corregido 2Castilla en época de isabel i corregido 2
Castilla en época de isabel i corregido 2
 
Guía N° 1
Guía N° 1 Guía N° 1
Guía N° 1
 
Peanuts: Organic Production
Peanuts: Organic ProductionPeanuts: Organic Production
Peanuts: Organic Production
 
Cómo calmar tu mente
Cómo calmar tu menteCómo calmar tu mente
Cómo calmar tu mente
 
KLT LED Lighting Introduction
KLT LED Lighting IntroductionKLT LED Lighting Introduction
KLT LED Lighting Introduction
 
Cancer pancreas
Cancer pancreasCancer pancreas
Cancer pancreas
 
whirlpool Annual Report2001
whirlpool Annual Report2001whirlpool Annual Report2001
whirlpool Annual Report2001
 
The Hunar Foundation's Presentation 2014
The Hunar Foundation's Presentation 2014The Hunar Foundation's Presentation 2014
The Hunar Foundation's Presentation 2014
 

Ähnlich wie BOTLAB excersise

denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designperfetbyedshareen
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...OWASP Delhi
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Aniq Eastrarulkhair
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the ArtBiagio Botticelli
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
paper review about botnet
paper review about botnetpaper review about botnet
paper review about botnetJhang Raymond
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Bots and malware
Bots and malwareBots and malware
Bots and malwareDoron Segal
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques SafiUllah Saikat
 

Ähnlich wie BOTLAB excersise (20)

BOTNET
BOTNETBOTNET
BOTNET
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
denialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive designdenialofservice.pdfdos attacck basic details with interactive design
denialofservice.pdfdos attacck basic details with interactive design
 
Botnets
BotnetsBotnets
Botnets
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
 
Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1Mcs2453 aniq mc101053-assignment1
Mcs2453 aniq mc101053-assignment1
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
Botnets
BotnetsBotnets
Botnets
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
paper review about botnet
paper review about botnetpaper review about botnet
paper review about botnet
 
Botnets
BotnetsBotnets
Botnets
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Bots and malware
Bots and malwareBots and malware
Bots and malware
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 

BOTLAB excersise

  • 2. What is a BOTNET? • A botnet is a collection of infected computers that have been infected with a virus to bring them under the control of one single hacker or organization. • This ability to control a large botnet gives hackers and cybercriminals the ability to send billions of spam emails, or orchestrate massive DDOS attacks at will. • A single Bot program is normally very weak unless spread across more computers. • Botnets are designed to harvest data such as passwords, Social Security numbers, credit card numbers, addresses, telephone numbers and other personal information. • A Botnet can have anywhere from a few hundred to thousands of devices at their disposal.
  • 3. What Are Botnets used For? • Keylogging A DDoS attack is an attack on the computers system or network that is usually focused on consuming the networks bandwidth and overloading the computational resources of the victims system Spamming is when an attacker is able to send massive amounts of bulk email (spam). Some bots also implement a special function to harvest email-addresses. Often that spam you are receiving was sent from, or proxied through, a family member’s old Windows computer sitting at home. • Spamming • Distributed Denial-of-Service Attacks (DDoS) With the help of a keylogger it is very easy for an attacker to retrieve sensitive information. An implemented filtering mechanism (e.g. "I am only interested in key sequences near the keyword 'usaa.com'") would further helps in stealing secret data.
  • 4. BOTNET ARCHITECTURE Client–server • A network based on the client-server model, where individual clients request services and resources from centralized servers • Star topology, in which the bots are organized around a central server. • Multi-server, in which there are multiple C&C servers for redundancy. • Hierarchical, in which multiple C&C servers that are organized into tiered groups.
  • 5. BOTNET ARCHITECTURE Peer-To-Peer (P2P) • botnets have a random organization and operate without a C&C server. Bot software maintains a list of trusted computers • The lack of a command-and-control server makes it less likely that detection of a single bot can lead to investigators taking down the entire network. • The work is distributed between many nodes, allowing them to shift to another node if one is taken down. • Any node in the network can act as both a client and a server.
  • 6. Social Media Hackers can use such aspects like Facebook in order to spread the Botnets across the world much like in 2013 where a Botnet called Lecpetex which infected over 50,000 personal computers. Hackers Target Host Computer
  • 7. Who's spamming us now? • Websites like http://botlab.org/ are used in finding and tracking the current Bot activity throughout the world. The top three countries that experience the most spam volume are: • India with 10.49% spam volume. • USA with 7.69% spam volume • Vietnam with 6.01% and increasing The top three countries that experience the most Bot IPs volume are: • India • Brazil • Russia
  • 8. Protective Mindset 02 01 03 04 ANTI-VIRUS Remember to keep it updated FIREWALL and other security software helps protect ones system Attachments Scan and verify every attachment before opening them Mobile Devices Are also at risk and can be used as Bots