Skip to content

Commit 7b2328f

Browse files
committed
Edit on vulnerabilities.
1 parent 566f38b commit 7b2328f

6 files changed

+17
-7
lines changed

botnet-wiki/_posts/anatomy/2015-01-03-vulnerabilities.markdown renamed to botnet-wiki/_posts/anatomy/2015-01-27-vulnerabilities.markdown

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,24 @@
11
---
22
layout: post
33
title: "Vulnerabilities"
4-
date: 2015-12-03 21:21:50
4+
date: 2015-01-27 21:21:50
55
categories: anatomy
66
---
77

8-
**INCOMPLETE MISSING CONTENT AND REFERENCES**
98

10-
Due to their immense size - botnets can consist of several ten thousand compromised machines - botnets pose serious threats. Distributed denial-of-service (DDoS) attacks are one such threat. Even a relatively small botnet with only 1000 bots can cause a great deal of damage. These 1000 bots have a combined bandwidth (1000 home PCs with an average upstream of 128KBit/s can offer more than 100MBit/s) that is probably higher than the Internet connection of most corporate systems. In addition, the IP distribution of the bots makes ingress filter construction, maintenance, and deployment difficult. In addition, incident response is hampered by the large number of separate organizations involved. Another use for botnets is stealing sensitive information or identity theft: Searching some thousands home PCs for password.txt, or sniffing their traffic, can be effective.
9+
In computer security, a vulnerability is defined as: a weakness that allows an attacker to reduce a system's information assurance.
10+
11+
Vulnerability is a intersection of three elements: **a system susceptibility or flaw**, attacker **access to the flaw**, and attacker capability to **exploit the flaw**.
12+
13+
![Vulnerability]({{ site.url }}/assets/vulnerability.png)
14+
15+
Due to their immense size - botnets can consist of several ten thousand compromised machines - botnets pose serious threats. Distributed denial-of-service (DDoS) attacks are one such threat. Even a relatively small botnet with only 1000 bots can cause a great deal of damage. These 1000 bots have a combined bandwidth (1000 home PCs with an average upstream of 128KBit/s can offer more than 100MBit/s) that is probably higher than the Internet connection of most corporate systems. In addition, the IP distribution of the bots makes ingress filter construction, maintenance, and deployment difficult. In addition, incident response is hampered by the large number of separate organizations involved.
16+
17+
Another use for botnets is stealing sensitive information or identity theft: Searching some thousands home PCs for password.txt, or sniffing their traffic, can be effective.
1118
The spreading mechanisms used by bots is a leading cause for "background noise" on the Internet, especially on TCP ports 445 and 135. In this context, the term spreading describes the propagation methods used by the bots. These malware scan large network ranges for new vulnerable computers and infect them, thus acting similar to a worm or virus.
1219

20+
As listed
21+
1322
**Vulnerability-specific ports:**
1423

1524
* 42 - WINS (Host Name Server)
@@ -25,7 +34,8 @@ The spreading mechanisms used by bots is a leading cause for "background noise"
2534
* 6129 - dameware (Dameware Remote Admin - DameWare Mini Remote Control Client Agent Service Pre-Authentication Buffer Overflow Vulnerability)
2635

2736

28-
The vulnerabilities behind some of these exploits can be found with the help of a search on Microsoft's Security bulletins (sample):
37+
**The vulnerabilities behind some of these exploits can be found with the help of a search on Microsoft's Security bulletins (sample):**
38+
2939
* MS03-007 Unchecked Buffer In Windows Component Could Cause Server Compromise
3040
* MS03-026 Buffer Overrun In RPC Interface Could Allow Code Execution
3141
* MS04-011 Security Update for Microsoft Windows

botnet-wiki/_posts/anatomy/2015-01-02-types-of-attacks.markdown renamed to botnet-wiki/_posts/anatomy/2015-01-28-types-of-attacks.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: post
33
title: "Types of Attacks"
4-
date: 2015-12-03 10:21:50
4+
date: 2015-01-28 10:21:50
55
categories: anatomy
66
---
77

botnet-wiki/_posts/anatomy/2015-01-03-types-of-bots.markdown renamed to botnet-wiki/_posts/anatomy/2015-01-29-types-of-bots.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: post
33
title: "Types of Bots"
4-
date: 2015-12-03 21:21:50
4+
date: 2015-01-29 21:21:50
55
categories: anatomy
66
---
77

botnet-wiki/_posts/anatomy/2015-01-01-how-bots-and-botnets-work.markdown renamed to botnet-wiki/_posts/anatomy/2015-01-30-how-bots-and-botnets-work.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: post
33
title: "How Bots and Botnets work"
4-
date: 2015-12-03 10:21:50
4+
date: 2015-01-30 10:21:50
55
categories: anatomy
66
---
77

-152 KB
Binary file not shown.

botnet-wiki/assets/vulnerability.png

48.6 KB
Loading

0 commit comments

Comments
 (0)