Using zombie and botnet model in silent web application reconnaissance

In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for att...

Full description

Saved in:
Bibliographic Details
Main Author: Hong, YanQin.
Other Authors: Lau Chiew Tong
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/52775
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-52775
record_format dspace
spelling sg-ntu-dr.10356-527752023-03-03T20:53:03Z Using zombie and botnet model in silent web application reconnaissance Hong, YanQin. Lau Chiew Tong School of Computer Engineering Temasek Laboratories DRNTU::Engineering::Computer science and engineering In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for attackers to work their way in exploiting the application. Moreover, many of the users today have low awareness of internet security which enable the attackers to unknowingly control them to perform malicious activities. In this project, we will be looking at different types of tools for web application reconnaissance, in particular using zombie and botnet model, and discuss what is the information collected and how silent the reconnaissance will be to the web application server and user. This project provides a brief introduction on the two types of zombie and botnet model, centralized and decentralized, as well as two types of reconnaissance techniques, active and passive. A range of selected reconnaissance tools are then tested for the usage of the tools and the information collected. Finally, analysis of each individual tools and comparison between the tools would be done. Level of silence in this project is depicted as how stealthy the reconnaissance is to the web application server; it is considered as silence as long as it is untraceable back to the attacker. The results have shown that for the active reconnaissance tools, the higher the level of silence, the lesser the information gained. But with the combination of passive and active techniques, we can achieve high silence level and high information gain. The combination of the techniques is by using the passive zombie and botnet model technique to perform active web application reconnaissance which can be incorporated into one new toolkit for easy manipulation over the botnet. Bachelor of Engineering (Computer Science) 2013-05-27T04:20:20Z 2013-05-27T04:20:20Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52775 en Nanyang Technological University 60 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Hong, YanQin.
Using zombie and botnet model in silent web application reconnaissance
description In today’s internet, communication between users is evolving in a very fast pace, interaction through web application becomes one of the most common way to exchange information with each other. As more and more web applications emerge in the market, web application naturally becomes a target for attackers to work their way in exploiting the application. Moreover, many of the users today have low awareness of internet security which enable the attackers to unknowingly control them to perform malicious activities. In this project, we will be looking at different types of tools for web application reconnaissance, in particular using zombie and botnet model, and discuss what is the information collected and how silent the reconnaissance will be to the web application server and user. This project provides a brief introduction on the two types of zombie and botnet model, centralized and decentralized, as well as two types of reconnaissance techniques, active and passive. A range of selected reconnaissance tools are then tested for the usage of the tools and the information collected. Finally, analysis of each individual tools and comparison between the tools would be done. Level of silence in this project is depicted as how stealthy the reconnaissance is to the web application server; it is considered as silence as long as it is untraceable back to the attacker. The results have shown that for the active reconnaissance tools, the higher the level of silence, the lesser the information gained. But with the combination of passive and active techniques, we can achieve high silence level and high information gain. The combination of the techniques is by using the passive zombie and botnet model technique to perform active web application reconnaissance which can be incorporated into one new toolkit for easy manipulation over the botnet.
author2 Lau Chiew Tong
author_facet Lau Chiew Tong
Hong, YanQin.
format Final Year Project
author Hong, YanQin.
author_sort Hong, YanQin.
title Using zombie and botnet model in silent web application reconnaissance
title_short Using zombie and botnet model in silent web application reconnaissance
title_full Using zombie and botnet model in silent web application reconnaissance
title_fullStr Using zombie and botnet model in silent web application reconnaissance
title_full_unstemmed Using zombie and botnet model in silent web application reconnaissance
title_sort using zombie and botnet model in silent web application reconnaissance
publishDate 2013
url http://hdl.handle.net/10356/52775
_version_ 1759856086499721216