To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
I'm trying to detect zombies, but not in a corporate environment, rather in a
home/small office environment. I'm trying find out if I can detect zombies
without having to spend a long time observing router activity. Do zombies that
communicate over http maintain a constant communication, or do they only have
brief communications?
Thanks
[EMAIL PROTECTED] wrote:
Send botnets mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
or, via email, send a message with subject or body 'help' to
[EMAIL PROTECTED]
You can reach the person managing the list at
[EMAIL PROTECTED]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of botnets digest..."
Today's Topics:
1. Re: Detecting zombies (David Glosser)
2. IRC C&C with a zombie doing a SYN scan on port 443 (Mason Schmitt)
3. Re: IRC C&C with a zombie doing a SYN scan on port 443
(Mason Schmitt)
4. [da] ISOI: Dinner and Drinking TONIGHT (Matt Jonkman)
----------------------------------------------------------------------
Message: 1
Date: Fri, 26 Jan 2007 09:47:42 -0800 (PST)
From: David Glosser
Subject: Re: [botnets] Detecting zombies
To: Thomas Raef ,
[email protected]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"
If you are in a corporate environment, check for user traffic on your firewall
during off hours, like weekends or between 2-5am.....
----- Original Message ----
From: Thomas Raef
To: [email protected]
Sent: Friday, January 26, 2007 12:26:30 PM
Subject: Re: [botnets] Detecting zombies
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
I haven't seen any personally, but I've read that some bots won't appear in
netstat because if they're a rootkit, they won't use the NT IP stack and
therefore won't show-up in netstat. I've also personally seen infections where
they replaced the netstat.exe file with one that won't show their connections.
I was creating a webcast to show others how to use netstat when I came across
this information.
Anyone with more expertise care to confirm or deny?
So to answer your question, I believe the only way is to watch the traffic at
the router/gateway. Close all programs and sit and watch for any connections
from that PC to the outside. With all programs closed, you shouldn't see any
traffic, unless it's set to autoupdate.
That's my two cents worth.
From: dr cronk [mailto:[EMAIL PROTECTED]
Sent: Fri 1/26/2007 8:43 AM
To: [email protected]
Subject: [botnets] Detecting zombies
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://www.whitestar.linuxbox.org/mailman/private/botnets/attachments/20070126/f49b5732/attachment.html
------------------------------
Message: 2
Date: Fri, 26 Jan 2007 14:38:10 -0800
From: Mason Schmitt
Subject: [botnets] IRC C&C with a zombie doing a SYN scan on port 443
To: [email protected]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I haven't seen a bot doing this before. Is there a new SSL
vulnerability that I haven't heard about yet? Or is it likely this bot
is scanning for the OpenSSL vulnerability that came out a long time ago?
Anyway, the C&C is 64.18.128.86
I'm going to kill the zombie now. I just thought someone might be able
to shed some light on this.
- --
Mason Schmitt
Systems Administrator
Sunwave Cable Internet / Shuswap Internet Junction
ph: (250) 832-9711
www.sunwave.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFuoLSbip6upg8pq8RAtjvAJ48eIOjD9dHaZ8l9kBS1MaFC+4vhQCfVJ5h
BvKUq1Thc8l1RDFjNtecO34=
=eTup
-----END PGP SIGNATURE-----
------------------------------
Message: 3
Date: Fri, 26 Jan 2007 15:02:42 -0800
From: Mason Schmitt
Subject: Re: [botnets] IRC C&C with a zombie doing a SYN scan on port
443
To: William Atchison
Cc: [email protected]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
William Atchison wrote:
>
> The reverse DNS on that IP is interesting:
> undernet.irc.justedge.net
>
Yeah, that is interesting. Here is the little bit of IRC traffic that I
grabbed when I did a capture to see what this was.
:[EMAIL PROTECTED] PRIVMSG #kiss-kiss
:.3Hop Tzop La Tine In Barlog;),. .04.satenutza...3! ..04+5.
.03(.04B.07o.03N.02u.06S .06B.02r.03E.07a.04K.13 +3!..03).
.14[..0512.0..14 sec. .050.66..14 cps..14]. .14[..14total..05 15772..14
locul..05 8..14].
:[EMAIL PROTECTED] PRIVMSG #kiss-kiss
:.2Raspunsul corect era: .04.National..2.. .2Sa vedem daca o stiti
Is there anyone from undernet on this list that might want to check out
this channel?
- --
Mason Schmitt
Systems Administrator
Sunwave Cable Internet / Shuswap Internet Junction
ph: (250) 832-9711
www.sunwave.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFuoiSbip6upg8pq8RAkG4AKCNy2jMlnQhq6T5nuBrhPZHlu10ggCeLChV
rSAnB/FXdpzpDaoKXfjnauE=
=4i+B
-----END PGP SIGNATURE-----
------------------------------
Message: 4
Date: Fri, 26 Jan 2007 17:04:24 -0800
From: Matt Jonkman
Subject: [botnets] [da] ISOI: Dinner and Drinking TONIGHT
To: [email protected]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1
For the folks in Seattle, as mentioned we'll have drinks for anyone
interested tonight at the Rock Bottom Bar, it's next door to the
TapHouse Grill we had dinner at on Wednesday.
550 106th Avenue, Suite 103
Bellevue, WA 98004
www.rockbottom.com
Phone: (425) 462-9300
http://www.rockbottom.com/RockBottomWeb/RBR/Index.aspx?PageName=/RockBottomWeb/Controls/Location/DisplayLocationRBR.ascx&SectionName=Root.LocationFinder.LocationResults.LocationDetails.OurPlace&LocationID=10056
It'll be informal, I've not called them to reserve a room. It's BYOFB. :)
Expect to see folks there within an hour after we end the conference
this evening, likely by 730 at the latest. If you're the first one there
please see if you can get a contiguous area under control.
Matt
--
--------------------------------------------
Matthew Jonkman
Bleeding Edge Threats
765-429-0398
765-807-3060 fax
http://www.bleedingthreats.net
--------------------------------------------
PGP: http://www.bleedingthreats.com/mattjonkman.asc
_______________________________________________
da mailing list
[EMAIL PROTECTED]
https://linuxbox.org/cgi-bin/mailman/listinfo/da
------------------------------
_______________________________________________
botnets mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets
End of botnets Digest, Vol 11, Issue 19
***************************************
---------------------------------
Sucker-punch spam with award-winning protection.
Try the free Yahoo! Mail Beta.
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets