viernes, 5 de octubre de 2012

Botnets, malware and network attacks (Workshop SBC)

Compartir este artículo:

Hi everybody!

On July 27th I was happy to give a presentation on the SBC workshop.The aim of the talk was to present for the first time, the Flu project to the international community.Of course, I was well accompanied by Pablo and Juanan, who could not miss the event :)This IEEE workshop is celebrated every two years in different parts of the world and this year it took place at the Telecommunication Faculty of the University Politécnica of Madrid.The event hold more than 400 students with different specialties from all over the world.We would like to thank the organization of the event to the faculty stuff as well as the IEEE and Rey Juan Carlos Univeristy members.Here is the link for further information about the event., you can find a summary of the talk, entitled "Botnets, malware and network attacks".- Firstly, we introduced Flu: its philosophy, the aspects it includes and the characteristics of the project.- Next, we reviewed the different kinds of malware: viruses, worms, troyans, spyware and time bombs, analyzing their peculiarities and differences.- We also dived into the botnets world: what they are, how they can be used, why they can be dangerous...And then we analyzed the Flu troyan, explaining in detail its features as well as how it works under the client-server architecture. Flu provides functions such as keylogger, remote cmd and powershell, screenshot, capturing the microphone, stealing files, accessing the registry and MSN contacts, accessing the web history and passwords, etc. Additionally, Flu makes possible to send commands directed either to a specific computer on the network or to the whole botnet. All these concepts were illustrated by a full practical demo of Flu.Mobile phone users might be interested in a version of the graphical interface developed for Andriod.Regarding Flu's impact, it is remarkable that it was included in a undergraduate thesis presented at the Deusto University. That work analyzes and detects botnet traffic, and a version of Flu was applied to create the botnet used to carry out the experiments.Finally, the last part of the talk was about network attacks, where attacks such as sniffing, ARP Spoofing and hijacking were explained.We hope the audience enjoyed the talk as much as we did :) We would like to thank for your attendance and interest.Here are the slides in case you are interested to have a look on them (to watch them properly please use font MV Boli). you very much and see you soon!Carmen

No hay comentarios:

Publicar un comentario en la entrada

Related Posts Plugin for WordPress, Blogger...