Malicious bots : an inside look into the cyber-criminal underground of the internet /
Saved in:
Author / Creator: | Dunham, Ken. |
---|---|
Imprint: | Boca Raton : Auerbach Publications, ©2009. |
Description: | 1 online resource |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13595451 |
Table of Contents:
- Preface
- Acknowledgments and Permissions
- About the Authors
- 1. Introduction to Bots
- 2. Thr34t Security Krew and the TK Worm
- 2.1. The Investigation of the Thr34t Krew
- 2.1.1. First DYNDNS Account (BestIce)
- 2.1.2. Second DYNDNS Account (Phreeze)
- 2.1.3. Third DYNDNS Account (D00M)
- 2.1.4. Seth Fogie
- 2.1.5. Help with Additional Technical Details
- 2.1.6. A Trip Across the Pond
- 2.1.7. Sitexec
- 2.1.8. DiSice
- 2.1.9. XaNiTH
- 2.1.10. Sitexec
- 2.1.11. Second Search Warrant Sweep
- 2.1.12. Jadaka
- 2.1.13. Mr40
- 2.1.14. Thr34t Krew Investigation: Concluding Comments
- 3. Demonstration: How a Hacker Launches a Botnet Attack
- 3.1. Step 1: Find, Modify, and Build a Bot
- 3.2. Step 2: Customize the Binary for Attack
- 3.3. Step 3: Launch the Attack
- 3.4. Step 4: Managing the Botherd
- 3.5. Step 5: Payloads, with an Emphasis on "Pay"
- 4. Introduction to the Use of Botnets in Criminal Activity
- 4.1. Timeline
- 4.2. Bots: A Pathway to Criminalization of the Information Age
- 4.3. Bots: The Integrated Business Solution for Criminals
- 4.4. "Botmasters" Who Were Caught
- 4.4.1. International Botnet Task Force Conferences
- 4.4.2. Operation "Bot Roast" I and II
- 4.5. How Big Do Botnets Need to Be to Pose a Serious Threat?
- 4.6. Peering Inside the IRC Botnet
- 4.7. Post-IRC-Based Bots
- 4.7.1. Botnet Attack Statistics
- 4.8. Botnet Features and the Criminal Enterprise
- 4.8.1. A Modular Approach to Botnets: A Major Aid to Criminals
- 4.8.2. Granular Spreading Capabilities
- 4.8.3. A "Service Bot"
- 4.8.4. The Degradation Feature of Botnets and Its Impact on Criminal Activity
- 4.9. Botherds Through the Eyes of a Criminal Mind
- 4.10. Criminal Vectors Utilizing Bots
- 4.10.1. Theft of Sensitive Information
- 4.10.2. DDoS Attacks and Extortion
- 4.10.3. Bot for Rent or Hire
- 4.10.4. Spam
- 4.11. Spam Bots and Criminalization
- 4.11.1. Pump-and-Dump Fraud
- 4.11.2. Covert Communications
- 4.11.3. Click Fraud and Affiliate Abuse
- 4.11.4. Adware Abuse
- 4.11.5. Taking Out the Competition
- 5. Botnets and the eCrime Cycle: The iSIGHT Partners' Approach
- 6. Technical Introduction to Bots
- 6.1. Common Ports
- 6.2. Command and Control Strategies
- 6.2.1. IRC C&C
- 6.2.2. Peer-to-Peer C&C
- 6.2.3. Web-Based C&C
- 6.2.4. Use of Encryption or Obfuscation
- 6.2.5. Types of Distributed Denial of Service (DDoS) Attacks
- 6.2.6. Introduction to Selected Bots
- 6.2.6.1. AgoBot
- 6.2.6.2. SDBot
- 6.2.6.3. PhatBot
- 6.2.6.4. The Infamous Hang-UP Team and IRC-Based Fraud Operations
- 6.2.6.5. Reptile
- 6.2.6.6. ZoTob
- 6.2.6.7. PBot
- 6.2.6.8. Tsunami
- 6.2.6.9. Kelvir
- 6.2.6.10. MetaFisher
- 6.2.6.11. Storm
- 7. Mitigation
- 8. Concluding Thoughts
- USA Today: Botnets Used for Blackmail in Cyber Extortions
- The Kraken Botnet
- A Botnet That Targets .edu and .mil Servers
- "Poisoning" the Storm Botnet
- The Battle Is Joined!
- The "Cyber Parasites" of the Internet
- On the Edge of a Precipice
- Glossary
- Bibliography
- Index