The life cycle of web server botnet recruitment

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

The life cycle of web server botnet recruitment
Trustwave-2013-web.jpg
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-03-06
Editor/Conference Trustwave
Link http://blog.spiderlabs.com/2013/03/the-life-cycle-of-web-server-botnet-recruitment.html blog.spiderlabs.com (blog.spiderlabs.com Archive copy)
Author Ryan Barnett
Type Blogpost

Abstract

Over the course of the past year, my team has monitored and analyzed vast amounts of data within our Web honeypots and shared intelligence in our [Honeypot Alert] blog posts. In this blog post, we want to illustrate the most common methods botnet owners use to compromise websites and make them part of their army. The data in this section shows examples of code snippets and log file entries from real captured attacks.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1314,
   editor = {Trustwave},
   author = {Ryan Barnett},
   title = {The life cycle of web server botnet recruitment},
   date = {06},
   month = Mar,
   year = {2013},
   howpublished = {\url{http://blog.spiderlabs.com/2013/03/the-life-cycle-of-web-server-botnet-recruitment.html blog.spiderlabs.com}},
 }