Malicious bots : an inside look into the cyber-criminal underground of the internet /

Saved in:
Bibliographic Details
Author / Creator:Dunham, Ken.
Imprint:Boca Raton : Auerbach Publications, ©2009.
Description:1 online resource
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13595451
Hidden Bibliographic Details
Other authors / contributors:Melnick, Jim.
ISBN:1420069039
9781420069037
9781420069068
1420069063
9781420069037
Notes:Title from title screen.
Includes bibliographical references and index.
Table of Contents:
  • Preface
  • Acknowledgments and Permissions
  • About the Authors
  • 1. Introduction to Bots
  • 2. Thr34t Security Krew and the TK Worm
  • 2.1. The Investigation of the Thr34t Krew
  • 2.1.1. First DYNDNS Account (BestIce)
  • 2.1.2. Second DYNDNS Account (Phreeze)
  • 2.1.3. Third DYNDNS Account (D00M)
  • 2.1.4. Seth Fogie
  • 2.1.5. Help with Additional Technical Details
  • 2.1.6. A Trip Across the Pond
  • 2.1.7. Sitexec
  • 2.1.8. DiSice
  • 2.1.9. XaNiTH
  • 2.1.10. Sitexec
  • 2.1.11. Second Search Warrant Sweep
  • 2.1.12. Jadaka
  • 2.1.13. Mr40
  • 2.1.14. Thr34t Krew Investigation: Concluding Comments
  • 3. Demonstration: How a Hacker Launches a Botnet Attack
  • 3.1. Step 1: Find, Modify, and Build a Bot
  • 3.2. Step 2: Customize the Binary for Attack
  • 3.3. Step 3: Launch the Attack
  • 3.4. Step 4: Managing the Botherd
  • 3.5. Step 5: Payloads, with an Emphasis on "Pay"
  • 4. Introduction to the Use of Botnets in Criminal Activity
  • 4.1. Timeline
  • 4.2. Bots: A Pathway to Criminalization of the Information Age
  • 4.3. Bots: The Integrated Business Solution for Criminals
  • 4.4. "Botmasters" Who Were Caught
  • 4.4.1. International Botnet Task Force Conferences
  • 4.4.2. Operation "Bot Roast" I and II
  • 4.5. How Big Do Botnets Need to Be to Pose a Serious Threat?
  • 4.6. Peering Inside the IRC Botnet
  • 4.7. Post-IRC-Based Bots
  • 4.7.1. Botnet Attack Statistics
  • 4.8. Botnet Features and the Criminal Enterprise
  • 4.8.1. A Modular Approach to Botnets: A Major Aid to Criminals
  • 4.8.2. Granular Spreading Capabilities
  • 4.8.3. A "Service Bot"
  • 4.8.4. The Degradation Feature of Botnets and Its Impact on Criminal Activity
  • 4.9. Botherds Through the Eyes of a Criminal Mind
  • 4.10. Criminal Vectors Utilizing Bots
  • 4.10.1. Theft of Sensitive Information
  • 4.10.2. DDoS Attacks and Extortion
  • 4.10.3. Bot for Rent or Hire
  • 4.10.4. Spam
  • 4.11. Spam Bots and Criminalization
  • 4.11.1. Pump-and-Dump Fraud
  • 4.11.2. Covert Communications
  • 4.11.3. Click Fraud and Affiliate Abuse
  • 4.11.4. Adware Abuse
  • 4.11.5. Taking Out the Competition
  • 5. Botnets and the eCrime Cycle: The iSIGHT Partners' Approach
  • 6. Technical Introduction to Bots
  • 6.1. Common Ports
  • 6.2. Command and Control Strategies
  • 6.2.1. IRC C&C
  • 6.2.2. Peer-to-Peer C&C
  • 6.2.3. Web-Based C&C
  • 6.2.4. Use of Encryption or Obfuscation
  • 6.2.5. Types of Distributed Denial of Service (DDoS) Attacks
  • 6.2.6. Introduction to Selected Bots
  • 6.2.6.1. AgoBot
  • 6.2.6.2. SDBot
  • 6.2.6.3. PhatBot
  • 6.2.6.4. The Infamous Hang-UP Team and IRC-Based Fraud Operations
  • 6.2.6.5. Reptile
  • 6.2.6.6. ZoTob
  • 6.2.6.7. PBot
  • 6.2.6.8. Tsunami
  • 6.2.6.9. Kelvir
  • 6.2.6.10. MetaFisher
  • 6.2.6.11. Storm
  • 7. Mitigation
  • 8. Concluding Thoughts
  • USA Today: Botnets Used for Blackmail in Cyber Extortions
  • The Kraken Botnet
  • A Botnet That Targets .edu and .mil Servers
  • "Poisoning" the Storm Botnet
  • The Battle Is Joined!
  • The "Cyber Parasites" of the Internet
  • On the Edge of a Precipice
  • Glossary
  • Bibliography
  • Index