Botnets Flashcards

1
Q

Bot Definition

A

Malware die remote über Kommandos gesteuert werden kann

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnetz Definition

A

Collectively controlled collection of bots
-> require a communication channel to facilitate Command & Control (C&C, C2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bots Takedown

A
  • Remove Bots: (Remotely) disinfect/wipe machine
  • Disconnect from C2: Prevent bots from receiving commands
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zentralisierte Architektur

A
  • Simple, efficient, scalable
  • Single point of failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Locating the C2

A
  • Hardcoded IPs & Domains: Blacklisting
  • DGAs: rendezvous points
    -> seed can be predictable (counter, date) or unpredictable
    -> predictability makes C2 infrastructure easier to manage for the botmaster, but also easier to monitor for defenders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Basic Takedown of a DGA Botnet

A

1) Reverse-engineer DGA
2) Run DGA, calculate valid domains
3) Monitor network activity (e.g. passive DNS)
4) Identify actual C2 servers
5) Proceed with takedown (contact hosting provider, cooperate with authorities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basic Monitoring of DGA Botnet

A

1) Reverse-engineer DGA
2) Run DGA, calculate valid domains
3) Register (first few, some, all) domains
4) Set up honeypot server
5) Monitor connecting bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fast Flux Network

A
  • DNS A records of C2 domain change rapidly (Zuweisung von Domain zu IPv4 Adresse)
  • Shuffle in benign IPs to disguise actual C2s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Double Flux Networks

A
  • DNS A and NS records of C2 domain change rapidly
    -> NS Record: Welcher Nameserver ist für die eingetragene Domain zuständig?
  • Also possibility to add proxies to forward traffic to actual C2s
    -> existing bots can be used as flux network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples for alternative C2 channels

A
  • Twitter
  • Bitcoin
  • Tor
  • P2P file sharing protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

P2P style: Parasitic

A
  • Leverages an existing P2P protocol for communication
    -> Bots identified via file advertisement
    -> Communication established via “watchwords”
    -> Commands pulled via file advertisement by botmaster & periodic file search by bots
    -> Commands pushed via file seach by botmaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

P2P Countermeasures: Index Poisoning (pull)

A
  • With a pull mechanism bots need to know what to query for
    1) Reverse-engineer watchwords
    2) Add defender nodes to P2P network
    3) Respond to watchword queries with bogus data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

P2P Countermeasures: Index Poisoning (Push)

A
  • With a pull mechanism bots need to know that to listen for
    1) Reverse-engineer command format
    2) Add defender nodes to P2P network
    3) Drop file search broadcasts that match the command format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

P2P Styles: Bot-Only

A
  • Constructs a separate network (on top of basic transport protocols like TCP)
    -> Communication established via (bootstrap) peer lists
    -> Bots identified via peer list exchange
    -> Commands pulled by polling peers
    -> Commands pushed by connecting directly to listening bots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

P2P Styles: Bot-Only: Bootstrap Peer Lists

A
  • Hardcoded: simple, but creates “few points of failure” and isn’t updatable
  • Server-based: bootstrap list can be rotated/updated, but creates same problems as centralized botnet
  • Propagated: self-contained, potentially lacks interconnection between infection paths
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

P2P Countermeasures: P2P Crawling

A

1) Reverse-engineer peer exchange algorithm
2) Find bootstrap peers
3) Iteratively request peer list from peers
-> Degree of success depends on implementation

17
Q

P2P Countermeasures: Sybil Attacks & Peer List Poisoning

A

1) Reverse-engineer peer exchange algorithm
2) Send bogus/defender peers to known peers
-> Degree of success depends on implementation