A Closer Look On C&C Panels: Seminar On Practical Security Tandhy Simanjuntak
A Closer Look On C&C Panels: Seminar On Practical Security Tandhy Simanjuntak
A Closer Look On C&C Panels: Seminar On Practical Security Tandhy Simanjuntak
Detection Methods
Compromise Methods
Introduction
Introduction A collection of internet-connected
compromised machines
What is To perform objectives in the hand of
Botnet Bot master Malicious
Gather credentials-PII
http://thumbs.dreamstime.com/z/vector-detective-illustration-flat-style-surveillance-control-concept-big-
brother-watching-you-37752327.jpg
Detection
Methods Google Dorks
Public C&C
Trackers
Detection Citadel or Zeus - inurl:“cp.php?m=login”
Methods
Google Dorks ICE IX - inurl:“adm/index.php?m=login”
Network Traffic
SpyEye - inurl:“/frmcp/”
Analysis
Network Traffic
Analysis
Public C&C
Trackers
Detection
Methods
Independent researchers
Google Dorks • Cyber Crime Tracker - http://cybercrime-
tracker.net/index.php
• Zeus Tracker - https://zeustracker.abuse.ch/
• SpyEye Tracker - https://spyeyetracker.abuse.ch/
Network Traffic
• Palevo Tracker - https://palevotracker.abuse.ch/
Analysis • Feodo Tracker - https://feodotracker.abuse.ch/
• Daily Botnet Statistics - http://botnet-
Public C&C tracker.blogspot.com/
Trackers
Detection
Methods
Securing C&C Panels
https://pixabay.com/get/52972f3a772794c94c16/1439055210/padlock-40192_1280.png?direct
Securing
Mechanisms Gate Component
Cryptographic Key
Gate.php
Extracted Code from gate component:
Securing
Mechanisms if(empty($list[SBCID_BOT_VERSION]) ||
empty($list[SBCID_BOT_ID]))die();
if(!connectToDb())die();
http://thumb9.shutterstock.com/display_pic_with_logo/1947692/231475606/stock-vector-hacker-internet-security-concept-flat-design-vector-illustration-231475606.jpg
Compromised
Malware RE
Methods
Backdoor access to Hosting Server
Malware RE
Obtain RC4 key via memory dump
Backdoor access to
Hosting Server
C&C Panels
Upload remote management shells to server
Weaknesses via upload vulnerability
• Block .php, .php3, .php4, .php5, .php, .asp, .aspx, .exe,
.pl, .cgi, .cmd, .bat, .phtml, .htaccess
• Apache treats .php. as a valid .php file.php.
Compromised
Methods
Malware RE
Backdoor access to
Hosting Server
C&C Panels
Weaknesses
Compromised
Methods Find others’ vulnerabilities
Open Ports
Unprotected Components
Open Ports
Unprotected Components
Open Ports
Unprotected Components
Ports Mapping
Unprotected Components
Ports Mapping
Unprotected Components
Ports Mapping
Unprotected Components
Ports Mapping
Unprotected Components
Ports Mapping
Unprotected Components
Ports Mapping
Unprotected Components
SQL Injection
Ports Mapping
Unprotected Components
SQL Injection
Ports Mapping