책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9781420069037
· 쪽수 : 168쪽
· 출판일 : 2008-08-06
목차
Introduction to Bots
Thr34t Security Krew and the TK Worm
The Investigation of the Thr34t Krew - Lance Mueller
First DYNDNS Account (BestIce)
Second DYNDNS Account (Phreeze)
Third DYNDNS Account (d00m)
Seth Fogie
Help with Technical Details
A Trip Across the Pond
Sitexec
DiSice
XaNith
Sitexec
Second Search Warrant Sweep
Jadaka
Mr40
Thr34t Krew Investigation Concluding Comments
Demonstration: How a Hacker Launches a Botnet Attack
Step 1: Find, Modify, and Build a Bot
Step 2: Customize the Binary for Attack
Step 3: Launch the Attack
Step 4: Managing the Botherd
Step 5: Payloads, with an Emphasis on “Pay”
Introduction to the Use of Botnets in Criminal Activity
Timeline
Bots: A Pathway to Criminalization of the Information Age
Bots: The Integrated Business Solution for Criminals
“Botmasters” Who Were Caught
International Botnet Task Force Conferences
Operation “Bot Roast” I and II
How Big Do Botnets Need to Be to Pose a Serious Threat?
Peering Inside the IRC Botnet
Post-IRC-Based Bots
Botnet Attack Statistics
Botnet Features and the Criminal Enterprise
A Modular Approach to Botnets: A Major Aid to
Criminals
Granular Spreading Capabilities
A “Service Bot”
The Degradation Feature of Botnets and Its Impact on
Criminal Activity
Changes in the Management of Botherds
Botherds through the Eyes of a Criminal Mind
Criminal Vectors Utilizing Bots
Theft of Sensitive Information
DDoS Attacks and Extortion
Bot for Rent or Hire
Spam
Spam Bots and Criminalization
Pump-and-Dump Fraud
Covert Communications
Click Fraud and Affiliate Abuse
Adware Abuse
Taking Out the Competition
Botnets and the eCrime Cycle: The iSIGHT Partners’ Approach
Technical Introduction to Bots
Common Ports
Command and Control Strategies
IRC C&C
Peer-to-Peer C&C
Web-Based C&C
Use of Encryption or Obfuscation
Types of Distributed Denial of Service (DDoS) Attacks
Introduction to Selected Bots
Mitigation
Glossary
Bibliography