SlideShare une entreprise Scribd logo
1  sur  60
Internet Security Forum 2009 趙嘉言 ,  Eric Chio “Log0” Internet Security Forum 2009
何方神圣 ,[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
基本概念 ,[object Object],[object Object],[object Object],Internet Security Forum 2009
研究报告在哪 ? ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
Internet Security Forum 2009
首先 … ,[object Object],Internet Security Forum 2009
僵尸网络是甚麽来的? ,[object Object],[object Object],Internet Security Forum 2009
动机 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
事实  1 –  有政治动机的  DDoS ,[object Object],[object Object],[object Object],[object Object],[object Object],Reference : ShadowServer - http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20090710 Internet Security Forum 2009
事实  2 –  点击骗 案 ,[object Object],[object Object],[object Object],[object Object],Reference : ClickForensics.- http://www.allbusiness.com/technology/software-services-applications-online/13282309-1.html Internet Security Forum 2009
事實  3  –  垃圾郵件 ,[object Object],[object Object],[object Object],Reference : Symantec MessageLabs - http://www.spamfighter.com/News-13296-Botnets-Generate-879-of-Total-Spam-Messages.htm Internet Security Forum 2009
关系 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
[object Object],Internet Security Forum 2009
结构 Internet Security Forum 2009
收集恶意软件 Internet Security Forum 2009
分析恶意软件 Internet Security Forum 2009
監控惡意軟件 Internet Security Forum 2009
结构 Internet Security Forum 2009
Internet Security Forum 2009
收集恶意软件 Internet Security Forum 2009
收集恶意软件 ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
Internet Security Forum 2009
分析恶意软件 Internet Security Forum 2009
分析一个恶意软件 Internet Security Forum 2009
分析多个恶意软件 ,[object Object],[object Object],Internet Security Forum 2009
分析多个恶意软件 For  恶意软件  in  恶意软件 列   : End for Internet Security Forum 2009
一些小事 ,[object Object],[object Object],Internet Security Forum 2009
一些小事 ,[object Object],[object Object],[object Object],Internet Security Forum 2009
[object Object],Internet Security Forum 2009
需要甚麽 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
需要甚麽 ,[object Object],Internet Security Forum 2009
需要甚麽  - IRC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
需要甚麽  - HTTP ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
需要甚麽 –  IRC ,[object Object],Internet Security Forum 2009
Internet Security Forum 2009
監控惡意軟件 Internet Security Forum 2009
如何加入僵尸网络 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
一些小事 ,[object Object],[object Object],[object Object],Internet Security Forum 2009
Internet Security Forum 2009
[object Object],Internet Security Forum 2009
做甚麽 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
数据循环 Internet Security Forum 2009
Internet Security Forum 2009
收集恶意软件 Internet Security Forum 2009
分析恶意软件 Internet Security Forum 2009
監控惡意軟件 Internet Security Forum 2009
结构 Internet Security Forum 2009
[object Object],Internet Security Forum 2009
关系 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
总结 –  工具 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
总结 ,[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009
代码 ,[object Object],[object Object],[object Object],Internet Security Forum 2009
安全研究 社区 ,[object Object],[object Object],[object Object],Internet Security Forum 2009
[object Object],更多资讯,请到: http://onhacks.org 研究毒網,请到: http://www.badurls.cn Eric Chio “Log0”,  安全研究爱好者 . 博客  : http://onhacks.org 电邮  : ckieric@gmail.com Internet Security Forum 2009 Thank you OWASP China and CISRG for organizing!
參考 ,[object Object],Internet Security Forum 2009
Internet Security Forum 2009
Internet Security Forum 2009
大公司 … ,[object Object],[object Object],Internet Security Forum 2009
监控流程 Internet Security Forum 2009
而你 ...  就可以去… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet Security Forum 2009

Contenu connexe

Tendances

電腦應用9 info sceurity
電腦應用9 info sceurity電腦應用9 info sceurity
電腦應用9 info sceuritySirong Chen
 
卡巴斯基個人版 7.0導覽
卡巴斯基個人版 7.0導覽  卡巴斯基個人版 7.0導覽
卡巴斯基個人版 7.0導覽 briian
 
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!前端工程師的告白: 親愛的,開源的物聯網好好玩呀!
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!Web Arduino
 
伺服器端攻擊與防禦III
伺服器端攻擊與防禦III伺服器端攻擊與防禦III
伺服器端攻擊與防禦IIITaien Wang
 
滲透測試 Talk @ Nisra
滲透測試 Talk @ Nisra滲透測試 Talk @ Nisra
滲透測試 Talk @ NisraOrange Tsai
 
2011網路犯罪大解密
2011網路犯罪大解密2011網路犯罪大解密
2011網路犯罪大解密NTUSTBIC
 
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28Shang Wei Li
 
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢T客邦
 
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心Jason Cheng
 
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會Jason Cheng
 
SITCON2021 Web Security 領航之路
SITCON2021  Web Security 領航之路SITCON2021  Web Security 領航之路
SITCON2021 Web Security 領航之路Tzu-Ting(Fei) Lin
 
A Concept of Network Analysis Tool by Data Mining
A Concept of Network Analysis Tool by Data MiningA Concept of Network Analysis Tool by Data Mining
A Concept of Network Analysis Tool by Data MiningJhang Raymond
 

Tendances (19)

08
0808
08
 
電腦應用9 info sceurity
電腦應用9 info sceurity電腦應用9 info sceurity
電腦應用9 info sceurity
 
卡巴斯基個人版 7.0導覽
卡巴斯基個人版 7.0導覽  卡巴斯基個人版 7.0導覽
卡巴斯基個人版 7.0導覽
 
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!前端工程師的告白: 親愛的,開源的物聯網好好玩呀!
前端工程師的告白: 親愛的,開源的物聯網好好玩呀!
 
伺服器端攻擊與防禦III
伺服器端攻擊與防禦III伺服器端攻擊與防禦III
伺服器端攻擊與防禦III
 
滲透測試 Talk @ Nisra
滲透測試 Talk @ Nisra滲透測試 Talk @ Nisra
滲透測試 Talk @ Nisra
 
【HITCON FreeTalk】Supply Chain Attack
【HITCON FreeTalk】Supply Chain Attack【HITCON FreeTalk】Supply Chain Attack
【HITCON FreeTalk】Supply Chain Attack
 
2011網路犯罪大解密
2011網路犯罪大解密2011網路犯罪大解密
2011網路犯罪大解密
 
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
HITCON GIRLS_惡意程式分析介紹_in 成功大學_by Turkey_2016.04.28
 
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢
11/21王團研究室—火線殺毒完全攻略—菁英課程:2010防毒新趨勢
 
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心
Proxmox VE 5.3 Cluster, High Availability & Others [20181223] @集思台大會議中心
 
5則新聞
5則新聞5則新聞
5則新聞
 
5則新聞
5則新聞5則新聞
5則新聞
 
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會
突破困境:資安開源工具之應用分享 [2019/03/21] @臺灣資安大會
 
Forensics 101
Forensics 101Forensics 101
Forensics 101
 
文献Vpn使用简介和入门
文献Vpn使用简介和入门文献Vpn使用简介和入门
文献Vpn使用简介和入门
 
SITCON2021 Web Security 領航之路
SITCON2021  Web Security 領航之路SITCON2021  Web Security 領航之路
SITCON2021 Web Security 領航之路
 
A Concept of Network Analysis Tool by Data Mining
A Concept of Network Analysis Tool by Data MiningA Concept of Network Analysis Tool by Data Mining
A Concept of Network Analysis Tool by Data Mining
 
5則新聞"
5則新聞"5則新聞"
5則新聞"
 

Similaire à A DIY Botnet Tracking System

2012 the botnet traffic forensics system
2012 the botnet traffic forensics system2012 the botnet traffic forensics system
2012 the botnet traffic forensics systemCanaan Kao
 
Security threatsandtrends michaelsentonas
Security threatsandtrends michaelsentonasSecurity threatsandtrends michaelsentonas
Security threatsandtrends michaelsentonasITband
 
虎尾科大報告
虎尾科大報告虎尾科大報告
虎尾科大報告琮凱 蘇
 
Malware Introduction and Defense
Malware Introduction and DefenseMalware Introduction and Defense
Malware Introduction and DefenseNi Zhiqiang
 
99 第六屆國際健康資訊管理研討會簡報botnet
99 第六屆國際健康資訊管理研討會簡報botnet99 第六屆國際健康資訊管理研討會簡報botnet
99 第六屆國際健康資訊管理研討會簡報botnetShi-Hwao Wang
 
電腦鑑識程序之研究
電腦鑑識程序之研究電腦鑑識程序之研究
電腦鑑識程序之研究guestce8b9
 
計算機概論報告
計算機概論報告計算機概論報告
計算機概論報告Ivan Chan
 
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...ChinaNetCloud
 
99 botnet期末簡報
99 botnet期末簡報99 botnet期末簡報
99 botnet期末簡報Shi-Hwao Wang
 
WebConf 2013「Best Practices - The Upload」
WebConf 2013「Best Practices - The Upload」WebConf 2013「Best Practices - The Upload」
WebConf 2013「Best Practices - The Upload」Orange Tsai
 
恶性代码和分析方案
恶性代码和分析方案恶性代码和分析方案
恶性代码和分析方案Youngjun Chang
 
Ict network security
Ict network securityIct network security
Ict network securityGary Tsang
 
資訊問題 Release
資訊問題 Release資訊問題 Release
資訊問題 Releaseguestaff2c7a
 
資訊問題 Release
資訊問題 Release資訊問題 Release
資訊問題 Releaseguestaff2c7a
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮NSFOCUS
 
22
2222
2242qu
 
企业安全应急响应与渗透反击V0.04(程冲)
企业安全应急响应与渗透反击V0.04(程冲)企业安全应急响应与渗透反击V0.04(程冲)
企业安全应急响应与渗透反击V0.04(程冲)WASecurity
 
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)Net Tuesday Taiwan
 
Forensics 101 的副本
Forensics 101 的副本Forensics 101 的副本
Forensics 101 的副本NCUDSC
 
Softwares And Internet Will Merge
Softwares And Internet Will MergeSoftwares And Internet Will Merge
Softwares And Internet Will MergeSting Chen
 

Similaire à A DIY Botnet Tracking System (20)

2012 the botnet traffic forensics system
2012 the botnet traffic forensics system2012 the botnet traffic forensics system
2012 the botnet traffic forensics system
 
Security threatsandtrends michaelsentonas
Security threatsandtrends michaelsentonasSecurity threatsandtrends michaelsentonas
Security threatsandtrends michaelsentonas
 
虎尾科大報告
虎尾科大報告虎尾科大報告
虎尾科大報告
 
Malware Introduction and Defense
Malware Introduction and DefenseMalware Introduction and Defense
Malware Introduction and Defense
 
99 第六屆國際健康資訊管理研討會簡報botnet
99 第六屆國際健康資訊管理研討會簡報botnet99 第六屆國際健康資訊管理研討會簡報botnet
99 第六屆國際健康資訊管理研討會簡報botnet
 
電腦鑑識程序之研究
電腦鑑識程序之研究電腦鑑識程序之研究
電腦鑑識程序之研究
 
計算機概論報告
計算機概論報告計算機概論報告
計算機概論報告
 
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...
 
99 botnet期末簡報
99 botnet期末簡報99 botnet期末簡報
99 botnet期末簡報
 
WebConf 2013「Best Practices - The Upload」
WebConf 2013「Best Practices - The Upload」WebConf 2013「Best Practices - The Upload」
WebConf 2013「Best Practices - The Upload」
 
恶性代码和分析方案
恶性代码和分析方案恶性代码和分析方案
恶性代码和分析方案
 
Ict network security
Ict network securityIct network security
Ict network security
 
資訊問題 Release
資訊問題 Release資訊問題 Release
資訊問題 Release
 
資訊問題 Release
資訊問題 Release資訊問題 Release
資訊問題 Release
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 
22
2222
22
 
企业安全应急响应与渗透反击V0.04(程冲)
企业安全应急响应与渗透反击V0.04(程冲)企业安全应急响应与渗透反击V0.04(程冲)
企业安全应急响应与渗透反击V0.04(程冲)
 
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)
20210824 #117 - 疫情正是非營利組織數位轉型好時機! (立宜)
 
Forensics 101 的副本
Forensics 101 的副本Forensics 101 的副本
Forensics 101 的副本
 
Softwares And Internet Will Merge
Softwares And Internet Will MergeSoftwares And Internet Will Merge
Softwares And Internet Will Merge
 

A DIY Botnet Tracking System

Notes de l'éditeur

  1. What are we going to learn? - How to track botnet How to make sense of data How to automate it How are we going to learn it? Through practical scenarios explanation How are we going to use it? - Explain through demos on how to use
  2. How many of you are familiar with botnets and zombies?
  3. How did people get to this conclusion? Analyzing the binaries. Of course, the way for you to get more information, is to be part of the botnet and analyze its patterns, logs – first hand.
  4. If you want to know when it happens, and how it happens, you have to be part of it to know. Analyzing click logs aren’t the only way.
  5. If you want to see the latest spam templates and where they are spamming, the place where the spam is sent is from the bots in the botnet. Huge profit for sending ads that no one are interested in.
  6. Decide to analyze afterwards, or analyze 1-by-1 on the fly. We will analyze 1-by-1 on the fly.
  7. Decide to analyze afterwards, or analyze 1-by-1 on the fly. We will analyze 1-by-1 on the fly.
  8. Yea, I know sec geeks love practical, but we cannot ignore theoretical aspects as well. I'll explain. There were a lot of subtleties in that for loop. I'll mention a few, the interested ones can look for my paper for exact details and how I address them one by one. 1. How to start a VM? What VM I used? I use VirtualBox. The VirtualBox has a VBoxManage command line tool to control VMs, very powerful, everything on GUI can be done with it. 2. How to start monitoring tools? In our case, we only need wireshark to capture network traffic. Start OUTSIDE of host to prevent Kernel object tampering, or start INSIDE to prevent HTTPS. 3. How to transfer the malware? General. Write a client and server, putting the client on Guest. When the Guest gets a file, it will automatically execute it. For any VM that can attach CD/DVD, like VirtualBox, attach a .iso that autoruns the malicious binary. 4. How long should the malware execute? 1 ~ 5 min. Some malware just wait, wait, wait forever. Or it is a downloader, and it is slow to get the real malware. Depending on if you are distributed and how much time you have ( usually run behind the scenes ), let it run for some 5 minutes. It isn't a CD, so it should do OK. 5. How about anti-debugging / anti-virtualizing malware? Out of scope, not discussed here. Provided resources and explanations how th ey work on my blog. "Detecting Virtualbox"
  9. Yea, I know sec geeks love practical, but we cannot ignore theoretical aspects as well. I'll explain. There were a lot of subtleties in that for loop. I'll mention a few, the interested ones can look for my paper for exact details and how I address them one by one. 1. How to start a VM? What VM I used? I use VirtualBox. The VirtualBox has a VBoxManage command line tool to control VMs, very powerful, everything on GUI can be done with it. 2. How to start monitoring tools? In our case, we only need wireshark to capture network traffic. Start OUTSIDE of host to prevent Kernel object tampering, or start INSIDE to prevent HTTPS. 3. How to transfer the malware? General. Write a client and server, putting the client on Guest. When the Guest gets a file, it will automatically execute it. For any VM that can attach CD/DVD, like VirtualBox, attach a .iso that autoruns the malicious binary. 4. How long should the malware execute? 1 ~ 5 min. Some malware just wait, wait, wait forever. Or it is a downloader, and it is slow to get the real malware. Depending on if you are distributed and how much time you have ( usually run behind the scenes ), let it run for some 5 minutes. It isn't a CD, so it should do OK. 5. How about anti-debugging / anti-virtualizing malware? Out of scope, not discussed here. Provided resources and explanations how th ey work on my blog. "Detecting Virtualbox"
  10. 1. What if the botnet operator sends a message to you?! They won't, unless it's a small botnet. (It's on the rise. Torpig. ) Otherwise, they will only automatically ping you. Just pong them. If they PING :113355 Then you PONG :113355 2. Username, host, mode, password, channel, server. Does the order matter in which I send? How about timing? For ordering, theoretically yes. But it's not that strict. The password is required, nick too, first. Then the channel goes the last. Normally, you authenticate yourself before doing anything, right? The same goes for botnet access control designs. 3. The botnet operator is sending me commands my software and even I do not recognize. What should I do? Employ "the rule of silence". Just don't say anything stupid. The internet is a best-effort place, so connection is not expected realtime or blackholed packets. Keep silence, and you will blend into the real bots. Botnets now are quite smart and if you send any commands that isn't whitelist, you immediately get an IP/NICK ban.
  11. Commands, understand and help document unseen commands for security researchers. HTTP urls, especially those with .exe .bat, these are likely to be malware binaries. Generally other HTTP urls could be phishing sites. Conversation logs. Inexperienced operators might treat it safe to talk on their botnet, revealing information. Other timing relation information. You might discover patterns or even preemptive 0-day attacks.
  12. If you got malware, you can then feed this malware into the system again analyzing. It mustn't point to the same botnet (FireEye blog), or perhaps it's some new interesting exploits. Now, you got a feedback loop. You get a malware and spy a botnet, and get a malware from the botnet and spy on yet another botnet.