Using zombie and botnet model in silent web application reconnaissance
In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for att...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52775 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-52775 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-527752023-03-03T20:53:03Z Using zombie and botnet model in silent web application reconnaissance Hong, YanQin. Lau Chiew Tong School of Computer Engineering Temasek Laboratories DRNTU::Engineering::Computer science and engineering In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for attackers to work their way in exploiting the application. Moreover, many of the users today have low awareness of internet security which enable the attackers to unknowingly control them to perform malicious activities. In this project, we will be looking at different types of tools for web application reconnaissance, in particular using zombie and botnet model, and discuss what is the information collected and how silent the reconnaissance will be to the web application server and user. This project provides a brief introduction on the two types of zombie and botnet model, centralized and decentralized, as well as two types of reconnaissance techniques, active and passive. A range of selected reconnaissance tools are then tested for the usage of the tools and the information collected. Finally, analysis of each individual tools and comparison between the tools would be done. Level of silence in this project is depicted as how stealthy the reconnaissance is to the web application server; it is considered as silence as long as it is untraceable back to the attacker. The results have shown that for the active reconnaissance tools, the higher the level of silence, the lesser the information gained. But with the combination of passive and active techniques, we can achieve high silence level and high information gain. The combination of the techniques is by using the passive zombie and botnet model technique to perform active web application reconnaissance which can be incorporated into one new toolkit for easy manipulation over the botnet. Bachelor of Engineering (Computer Science) 2013-05-27T04:20:20Z 2013-05-27T04:20:20Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52775 en Nanyang Technological University 60 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Hong, YanQin. Using zombie and botnet model in silent web application reconnaissance |
description |
In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for attackers to work their way in exploiting the application. Moreover, many of the users today have low awareness of internet security which enable the attackers to unknowingly control them to perform malicious activities.
In this project, we will be looking at different types of tools for web application reconnaissance, in particular using zombie and botnet model, and discuss what is the information collected and how silent the reconnaissance will be to the web application server and user.
This project provides a brief introduction on the two types of zombie and botnet model, centralized and decentralized, as well as two types of reconnaissance techniques, active and passive. A range of selected reconnaissance tools are then tested for the usage of the tools and the information collected. Finally, analysis of each individual tools and comparison between the tools would be done.
Level of silence in this project is depicted as how stealthy the reconnaissance is to the web application server; it is considered as silence as long as it is untraceable back to the attacker. The results have shown that for the active reconnaissance tools, the higher the level of silence, the lesser the information gained. But with the combination of passive and active techniques, we can achieve high silence level and high information gain.
The combination of the techniques is by using the passive zombie and botnet model technique to perform active web application reconnaissance which can be incorporated into one new toolkit for easy manipulation over the botnet. |
author2 |
Lau Chiew Tong |
author_facet |
Lau Chiew Tong Hong, YanQin. |
format |
Final Year Project |
author |
Hong, YanQin. |
author_sort |
Hong, YanQin. |
title |
Using zombie and botnet model in silent web application reconnaissance |
title_short |
Using zombie and botnet model in silent web application reconnaissance |
title_full |
Using zombie and botnet model in silent web application reconnaissance |
title_fullStr |
Using zombie and botnet model in silent web application reconnaissance |
title_full_unstemmed |
Using zombie and botnet model in silent web application reconnaissance |
title_sort |
using zombie and botnet model in silent web application reconnaissance |
publishDate |
2013 |
url |
http://hdl.handle.net/10356/52775 |
_version_ |
1759856086499721216 |