|
Downloading the file sotm27.gz from http://www.honeynet.org/misc/files/sotm27.gz and comparing the checksum
to get sure i got an exact copy. Extracting it, making coffee and starting..... |
|
|
1. What is IRC? :
- IRC (Internet Relay Chat) is compareable to CB Radio. You can talk in real time
to people all over the world.
IRC is a multi-user, multi-channel chat system that is run on a Network.
Like the telephone, the Internet allows people to communicate with each other from any place
in the world at the same time. The major difference is that the Internet makes it easy to meet and
communicate in groups as well as individually
|
2. What message is sent by an IRC client when it asks to join an IRC network? :
- to enter a server you have to type:
/server <server name>
- to join a channel you have to type:
/join #<channel name>
|
3. What is a botnet? :
-
Firstly, a botnet is not a net of nice little IRC eggdrops some of you use in your channels to
manage access lists, run quizzes, serve files or come up with corny lines.
They do have something in common with those bots you know and love though,
as they are automated and controlled by events (usually commands given in a channel).
Botnet variety have been created with a trojan and, almost always,
without the knowledge of the person whose computer they are running from.
The trojan may have got on to the person's computer by being wrapped up in a file that looks innocent -
usually a game crack, something sex related, or it can simply be named to make you think it's
an anti-virus program! It may have got there because
there was some hidden code on a website that person visited, which downloaded it to their machine.
Well, the next time that computer is connected to the Internet,
that trojan will start up an IRC client and connect to a server.The trojan will also have been coded to
make the bot join a certain channel once it has connected.
A collection of these bots in a channel is a BOTNET !
|
4. What are botnets commonly used for? :
-
Tthe nastiest thing most of these bots can do is to
launch Denial of Service attacks against servers - hundreds or thousands of bots all sending
data to a server until its connection becomes saturated and/or the server crashes.
Because the bots are making many home computers attack, from all over the world,
we call this a Distributed Denial of Service attack (DDoS).
|
5. What TCP ports does IRC generally use? :
- Default IRC Port: 6667
|
6. What is a binary log file and how is one created? :
- Instead of converting the captured traffic into human readable
format, a binary log file captures 1's and 0's. Sometime calles
"raw" traffic capture.
Its often used at high traffic areas, cause its a lot faster and the files
are smaller in size.
The date is captured either in the physical or data-link, or network layer
using the capture library: "Libpcap library".
|
7. What IRC servers did the honeypot, which has the IP address 172.16.134.191, communicate with ?:
- Using ethereal filter:
ip.src == 172.16.134.191 && tcp.dstport == 6667 && tcp.flags.syn == 1
- 66.33.65.58 (but it seems to be dead)
[66.33.0.0 - 66.33.127.255 Dialtone Inc.4101 SW 47th AveSuite 101Davie, FL, 33314US]
- 63.241.174.144 (Nickname ehisou already in use. Connection timed out!)
[63.240.0.0 - 63.242.255.255 CERFnet9805 Scranton RoadSuite 150San Diego, CA, 92121US
AT&T Enhanced Network Services]
- 217.199.175.10 (Server was full)
[217.199.172.0 - 217.199.175.255 Host Europe customer machines]
- 209.126.161.29 (but seems to be dead)
[209.126.128.0 - 209.126.255.255 California Regional Internet, Inc.8929A COMPLEX DRIVESAN DIEGO, CA, 92123US
California Regional Intranet, Inc.]
- 209.196.44.172 (Logged in with username: rgdiuggac
and masking his dynamic part of his ip -> MODE -x
and makes himself invisible for user not in the same channel -> MODE +i)
[209.196.0.0 - 209.196.63.255 Sprint12502 Sunrise Valley Dr.Reston, VA, 20196US]
Additional Information from ALL NETTOOLS
|
8. During the observation period, how many distinct hosts accessed the botnet
associated with the server having IP address 209.196.44.172? :
- I found 8115 host connecting to the botnet.
I got the number by listing all IRC response packets coming from 209.196.44.172
Using ethereal filter: ip.src == 209.196.44.172 && irc.response == 1
I tried also adding the filter: irc.command == "JOIN :#xàéüîéðìx" , but i wasn´t able to enter the charcters "àéüîéðìx"
in the ethereal filter box. So i printed the selected lines to a file and wrote a little script, which counts the irc JOIN commands in
the outputfile.
After writing another little script, wiping of all double entries i got the number of 4815 !!
distinct host access the botnet
|
9. Assuming that each botnet host has a 56 kbps network link, what is the aggregate bandwidth of the botnet? :
- 4815 * 56kbps = 269.640 kbps.
454.432 / 1024 = 263.32 Mbps OR 32,92 MB/s
|