SlideShare a Scribd company logo
1 of 21
Botnet Mitigation, Monitoring and Management - Harshad Patil nullcon Goa 2010 http://nullcon.net
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agenda nullcon Goa 2010 http://nullcon.net
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
What is DOS nullcon Goa 2010 http://nullcon.net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Botnets? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Attack vectors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
How they operate ,[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
CnC Architecture nullcon Goa 2010 http://nullcon.net Botmaster C & C Bots Bots Bots
P2P Architecture nullcon Goa 2010 http://nullcon.net Botmaster C & C C & C Bots Bots Bots
Concerning factors ,[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Concerning factors nullcon Goa 2010 http://nullcon.net ,[object Object]
Concerning factors nullcon Goa 2010 http://nullcon.net
Concerning factors nullcon Goa 2010 http://nullcon.net
Protection Detection Remediation nullcon Goa 2010 http://nullcon.net
Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net ,[object Object]
Current Mitigation effort nullcon Goa 2010 http://nullcon.net ,[object Object]
Botnet Monitoring System: nullcon Goa 2010 http://nullcon.net ,[object Object]
Some current cases ,[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net
Torpig details nullcon Goa 2010 http://nullcon.net
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],nullcon Goa 2010 http://nullcon.net ,[object Object]

More Related Content

Viewers also liked

zbeardUXportfolio816
zbeardUXportfolio816zbeardUXportfolio816
zbeardUXportfolio816
Zach Beard
 
Relax, familiarize and facilitate - Interkulturelles Management in Indien
Relax, familiarize and facilitate - Interkulturelles Management in IndienRelax, familiarize and facilitate - Interkulturelles Management in Indien
Relax, familiarize and facilitate - Interkulturelles Management in Indien
Dr. Christian Fels
 
125 Accreditation Certificate_2016_Gary Hendrickson
125 Accreditation Certificate_2016_Gary Hendrickson125 Accreditation Certificate_2016_Gary Hendrickson
125 Accreditation Certificate_2016_Gary Hendrickson
glhendrickson
 
Maricel Clicker survey session
Maricel Clicker survey sessionMaricel Clicker survey session
Maricel Clicker survey session
Daniela Gachago
 

Viewers also liked (20)

Presentation fgd
Presentation fgdPresentation fgd
Presentation fgd
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
zbeardUXportfolio816
zbeardUXportfolio816zbeardUXportfolio816
zbeardUXportfolio816
 
Lessons Learned by Implementing ArchivesSpace and Archivematica at the Bentle...
Lessons Learned by Implementing ArchivesSpace and Archivematica at the Bentle...Lessons Learned by Implementing ArchivesSpace and Archivematica at the Bentle...
Lessons Learned by Implementing ArchivesSpace and Archivematica at the Bentle...
 
Relax, familiarize and facilitate - Interkulturelles Management in Indien
Relax, familiarize and facilitate - Interkulturelles Management in IndienRelax, familiarize and facilitate - Interkulturelles Management in Indien
Relax, familiarize and facilitate - Interkulturelles Management in Indien
 
125 Accreditation Certificate_2016_Gary Hendrickson
125 Accreditation Certificate_2016_Gary Hendrickson125 Accreditation Certificate_2016_Gary Hendrickson
125 Accreditation Certificate_2016_Gary Hendrickson
 
Social media security
Social media securitySocial media security
Social media security
 
Maintenance delivery capacity and options hgs v 1.9 7 jun 2011
Maintenance delivery capacity and options hgs v 1.9 7 jun 2011Maintenance delivery capacity and options hgs v 1.9 7 jun 2011
Maintenance delivery capacity and options hgs v 1.9 7 jun 2011
 
Maricel Clicker survey session
Maricel Clicker survey sessionMaricel Clicker survey session
Maricel Clicker survey session
 
EI FLYER-HC
EI FLYER-HCEI FLYER-HC
EI FLYER-HC
 
Ensayo de las tics
Ensayo de las ticsEnsayo de las tics
Ensayo de las tics
 
Zusammenfassung Barmer GEK - Hilfsmittelversorgungsvertrag (OT - 2) Produktgr...
Zusammenfassung Barmer GEK - Hilfsmittelversorgungsvertrag (OT - 2) Produktgr...Zusammenfassung Barmer GEK - Hilfsmittelversorgungsvertrag (OT - 2) Produktgr...
Zusammenfassung Barmer GEK - Hilfsmittelversorgungsvertrag (OT - 2) Produktgr...
 
Man ne dzin 2016
Man ne dzin 2016Man ne dzin 2016
Man ne dzin 2016
 
Roadwork signing john coles
Roadwork signing   john colesRoadwork signing   john coles
Roadwork signing john coles
 
Sawabona Shikoba
Sawabona ShikobaSawabona Shikoba
Sawabona Shikoba
 
Ecoporanga
EcoporangaEcoporanga
Ecoporanga
 
A Midia Que Mais Cresce
A Midia Que Mais CresceA Midia Que Mais Cresce
A Midia Que Mais Cresce
 
Workshop2 sectorisation v1
Workshop2 sectorisation v1Workshop2 sectorisation v1
Workshop2 sectorisation v1
 
Widgets e Masters no Axure 7.0
Widgets e Masters no Axure 7.0Widgets e Masters no Axure 7.0
Widgets e Masters no Axure 7.0
 
Ghandi p bill paterson ppt v 3
Ghandi p bill paterson ppt v 3Ghandi p bill paterson ppt v 3
Ghandi p bill paterson ppt v 3
 

Similar to nullcon 2010 - Botnet mitigation, monitoring and management

Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic AnalysisLife Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Positive Hack Days
 

Similar to nullcon 2010 - Botnet mitigation, monitoring and management (20)

nullcon 2010 - The evil karmetasploit upgrade
nullcon 2010 - The evil karmetasploit upgradenullcon 2010 - The evil karmetasploit upgrade
nullcon 2010 - The evil karmetasploit upgrade
 
[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
WebRTC: A front-end perspective
WebRTC: A front-end perspectiveWebRTC: A front-end perspective
WebRTC: A front-end perspective
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Lightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFALightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFA
 
Botnet
Botnet Botnet
Botnet
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet[2010 CodeEngn Conference 04] Max - Fighting against Botnet
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
 
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
DEF CON 27 - GRICHTER - reverse engineering 4g hotspots for fun bugs net fina...
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
Detection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P BotnetsDetection of Botnets using Honeypots and P2P Botnets
Detection of Botnets using Honeypots and P2P Botnets
 
A Survey of HTTP Botnet Detection
A Survey of HTTP Botnet DetectionA Survey of HTTP Botnet Detection
A Survey of HTTP Botnet Detection
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial BotnetA Botnet Detecting Infrastructure Using a Beneficial Botnet
A Botnet Detecting Infrastructure Using a Beneficial Botnet
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 
098
098098
098
 
Taming botnets
Taming botnetsTaming botnets
Taming botnets
 
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic AnalysisLife Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
 
Paper(edited)
Paper(edited)Paper(edited)
Paper(edited)
 
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
 

More from n|u - The Open Security Community

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

nullcon 2010 - Botnet mitigation, monitoring and management