Botnets Flashcards
Bot Definition
Malware die remote über Kommandos gesteuert werden kann
Botnetz Definition
Collectively controlled collection of bots
-> require a communication channel to facilitate Command & Control (C&C, C2)
Bots Takedown
- Remove Bots: (Remotely) disinfect/wipe machine
- Disconnect from C2: Prevent bots from receiving commands
Zentralisierte Architektur
- Simple, efficient, scalable
- Single point of failure
Locating the C2
- Hardcoded IPs & Domains: Blacklisting
- DGAs: rendezvous points
-> seed can be predictable (counter, date) or unpredictable
-> predictability makes C2 infrastructure easier to manage for the botmaster, but also easier to monitor for defenders
Basic Takedown of a DGA Botnet
1) Reverse-engineer DGA
2) Run DGA, calculate valid domains
3) Monitor network activity (e.g. passive DNS)
4) Identify actual C2 servers
5) Proceed with takedown (contact hosting provider, cooperate with authorities)
Basic Monitoring of DGA Botnet
1) Reverse-engineer DGA
2) Run DGA, calculate valid domains
3) Register (first few, some, all) domains
4) Set up honeypot server
5) Monitor connecting bots
Fast Flux Network
- DNS A records of C2 domain change rapidly (Zuweisung von Domain zu IPv4 Adresse)
- Shuffle in benign IPs to disguise actual C2s
Double Flux Networks
- DNS A and NS records of C2 domain change rapidly
-> NS Record: Welcher Nameserver ist für die eingetragene Domain zuständig? - Also possibility to add proxies to forward traffic to actual C2s
-> existing bots can be used as flux network
Examples for alternative C2 channels
- Bitcoin
- Tor
- P2P file sharing protocols
P2P style: Parasitic
- Leverages an existing P2P protocol for communication
-> Bots identified via file advertisement
-> Communication established via “watchwords”
-> Commands pulled via file advertisement by botmaster & periodic file search by bots
-> Commands pushed via file seach by botmaster
P2P Countermeasures: Index Poisoning (pull)
- With a pull mechanism bots need to know what to query for
1) Reverse-engineer watchwords
2) Add defender nodes to P2P network
3) Respond to watchword queries with bogus data
P2P Countermeasures: Index Poisoning (Push)
- With a pull mechanism bots need to know that to listen for
1) Reverse-engineer command format
2) Add defender nodes to P2P network
3) Drop file search broadcasts that match the command format
P2P Styles: Bot-Only
- Constructs a separate network (on top of basic transport protocols like TCP)
-> Communication established via (bootstrap) peer lists
-> Bots identified via peer list exchange
-> Commands pulled by polling peers
-> Commands pushed by connecting directly to listening bots
P2P Styles: Bot-Only: Bootstrap Peer Lists
- Hardcoded: simple, but creates “few points of failure” and isn’t updatable
- Server-based: bootstrap list can be rotated/updated, but creates same problems as centralized botnet
- Propagated: self-contained, potentially lacks interconnection between infection paths