IRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss
|
|
|
- Abel Mills
- 10 years ago
- Views:
Transcription
1 IRC-Client IRC Group: Arne Bochem, Benjamin Maas, David Weiss September 1, 2007
2 Contents 1 Introduction Description Motivation Background The IRC protocol Overview IRC messages Connecting to an IRC network Operators Filetransfer with DCC CTCP DCC XDCC bots Implementation Overview IRC Required IRC messages Persistency Bot communication Data collection Measures against bots Statistics aggregation Robustness Bot recognition Event logging Results Methodology Diagram notes Regions Offered and transferred data Record data rate Online time Operating systems Conclusion
3 1 Introduction 1.1 Description The purpose of this project was to implement an IRC (Internet Relay Chat) client, which is able to connect to IRC servers, join channels and fully automatically retrieve the IP addresses of, and other information about XDCC bots. The word bot stems from the word robot. In the context of IRC, a bot is an automatic client with some specific function or functions, which can range from greeting new users to offering files for download. 1.2 Motivation XDCC bots are used to serve files (mostly software/movies etc.) and usually run on hacked computers. By collecting their IP addresses, we can gain some insight, as to which parts of the world are most oftenly targeted by botnet owners, who control a large number of compromised machines ( zombies or bots ). These machines are usually tied together in a botnet, and used for purposes like distributed denial of service (DDoS) attacks, in which the target is bombarded with useless data from the bots, to fill up its bandwidth, sending spam, or breaking into even more computers. Since network security became more ubiquitous in the western hemisphere (USA, Europe), and copyright holders became more active to prevent unauthorized copying (collaboration with law enforcement etc.), it should prove interesting to see where these bots come from. The current assumption is, that they are equally distributed around the world, but it is quite possible that some areas of the world are targeted more than others. Some Asian nations have a high amount of home-users with very fast broadband connections, which should be ideal targets for botnet owners. One example of such a country is South Korea, which has one of leading broadband infrastructures in the world. [18] Still, analyzing the origin of XDCC bots will only provide a partial view of the situation, since there will still be a significant number of bots that evade detection, simply because they are not used for offering files via IRC, but for other malicious purposes. 2 Background 2.1 The IRC protocol This section will explain basic IRC concepts which are relevant for our IRC protocol implementation Overview Internet Relay Chat (IRC) is an online chat system. The IRC protocol is described in RFC 1459 [7]. RFC 1459 has been updated by RFC 2810, 2811, 2812 and 2813 [7], but these documents have little practical relevance today. Protocols that allow IRC to be used for purposes other than text chat will be introduced in section 2.2. Figure 1 gives an overview of the IRC architecture. Two IRC networks (IRC 2
4 Figure 1: IRC architecture Net 1 and IRC Net 2) are depicted; in reality there is a large number of independent IRC networks. Networks are organized as client-server systems. In figure 1 the servers S1 and S2 form an IRC network. Clients may be connected to several IRC networks simultaneously, such as client A. The links represent TCP connections. The servers main task is to provide for message exchange between the clients. For example, if client A wants to send a (private) message to a client connected to S2, the message is sent via S1 and S2. From a client s point of view there is only direct communication with one server per network. In particular it does not have to regard server-to-server communication at all IRC messages It is worth mentioning that IRC messages are encoded using 8-bit character codes. IRC commands like join, nick or whois are easy to remember and can be typed quickly. This makes it possible to use IRC over a simple TELNET client. A typical IRC message would look like this: :[email protected] PRIVMSG gabi :Hallo! Messages consist of three parts that are separated by whitespaces. The first part (prefix) indicates the message s origin. IRC servers will add correct prefixes to all messages they receive from clients. Therefore, clients do not need to specify a prefix when sending a message. The second part is the IRC command. During conversations the privmsg command is used to send text messages to other users. Some other commands will be described below. The last message part consists of a number of parameters (depending on the command). For the privmsg command a recipient has to be given as a parameter (message target). Each IRC user is identified by a nickname, which has to be unique for the respective IRC network. The message target may be a nickname. However, 3
5 IRC conversations usually take place in channels (chat rooms). It is also possible to send a privmsg message to a channel. In that case, the IRC servers replicate the message, and deliver it to all users that previously joined the channel. The exact IRC message syntax is described in RFC 1459 [7] Connecting to an IRC network A user that wishes to communicate via an IRC network needs to register a connection with one of the network s IRC servers. This process can be divided into the following steps: 1. Establish a TCP connection to the server. 2. Send a user message specifying the name under which the user is known to his or her operating system (user name/ident), and the user s real name. Note that the server has no way to verify this information. 3. Send a nick message specifying the desired nickname. After connection registration, the user is able to join channels using the join command, and to communicate with other users. The server may regularly send ping messages to test if a client is still active. The network is left gracefully with the quit command Operators Some IRC users (channel operators) can remove users that act abusively from a channel ( kick ), and prevent them from rejoining it ( ban ). The mode command is used to set the operator status (user mode +o ) and other user/ channel modes; the servers keep track of who has which modes. Network/server operators can disconnect users from their respective servers (for example using the kill command), and prevent them from reconnecting to a certain server ( k-lined users), or prevent them from reconnecting to the network at all ( g-lined users). Those measures are often applied automatically. For example, when a user sends a certain amount of messages to a channel within a short period of time, he or she might be kicked. Such triggered measures are usually temporary. 2.2 Filetransfer with DCC The Direct Client-To-Client (DCC; sometimes also written out as Direct Client Connection ) protocol and the Client-To-Client Protocol (CTCP) operate on top of the IRC protocol. There is no official authoritative specification, but there are several documents from different authors describing the protocols [11]. Many IRC clients implement both protocols CTCP CTCP allows to embed special characters like linebreaks in privmsg and notice messages. (The difference between privmsg and notice is that privmsg messages are not supposed to be sent as automated replies to avoid loops.) More importantly, CTCP defines a number of request/reply pairs. For 4
6 example, a user may query the name and version of another user s IRC client using PRIVMSG klara :[001]VERSION[001], where [001] denotes the ASCII character with the octal representation 001. A CTCP capable client like mirc [14] will reply accordingly: PRIVMSG thomas :[001]VERSION mirc:v6.21[001] DCC DCC is used to establish a direct TCP connection between two clients. This connection can then be used for efficient file transfer (among of other purposes). The connection is negotiated through special CTCP requests. Assume that in figure 1 client C wishes to send a file to client A. The following steps are necessary: 1. C chooses a TCP port number for the file transfer and listens on that port. 2. C sends the CTCP request DCC SEND [filename] [C s IP address] [port number] [file size]. 3. A connects to the respective IP address/port number. 4. C sends the file over the DCC connection. That means C acts as a DCC server. However, A could also be the DCC server (passive DCC). There are various passive DCC mechanisms [3]; here is how the Reverse/Firewall DCC scheme would work: 1. C sends the CTCP request DCC SEND [filename] [dummy IP address] 0 [file size] [ token as a session identifier]. 2. A chooses a TCP port number for the file transfer and listens on that port. 3. A sends the CTCP request DCC SEND [filename] [A s IP address] [port number] [file size] [token]. 4. C connects to the respective IP address/ port number and sends the file. 2.3 XDCC bots IRC bots are clients that run without user interaction. Bots may carry out numerous tasks such as channel maintenance or entertainment. After all, the client we have written for data collection is a bot. This section will focus on bots that are used for automated file transfer. Within the scope of this project, we are especially interested in bots that are used to distribute pirated content ( warez ). Fserve, which is part of the mirc client, and, more importantly, XDCC seem to be the most commonly used bots for that purpose. An open XDCC implementation can be found at [12]. Below we will describe how warez are spread by XDCC bots. 5
7 There are dedicated IRC channels for warez distribution, that the bots join. IRC users who wish to download such warez (downloaders) can use search engines like Packetnews.com [15] to find out the channel names. The channels are normally moderated (channel mode +m ). This means that only users with +v ( voice ) user mode are able to send messages to the channel. Typically only the bots have that mode. They regularly send privmsg messages to the channel and advertise their files. An advertisement may look like this: ** 2 packs ** 3 of 8 slots open, Record: 50.5KB/s ** Bandwidth Usage ** Current: 37.1KB/s, Record: 239.7KB/s ** To request a file, type "/msg [alt]-wick-263 xdcc send #x" ** ** To request details, type "/msg [alt]-wick-263 xdcc info #x" ** #1 17x [1.4G] States.Evidence.2006.DVDRip.XviD-VoMiT.tar #2 26x [705M] The.Silver.Surfer.2007.CAM.XViD-FuZeVcD.tar The first two messages contain statistics and information about the current load. The last messages list the names of the offered files and their size. The third message tells the downloaders how the files can be accessed; the text xdcc send #x, where x is the number under which the desired file has been listed, has to be sent in a privmsg message. Bots usually limit the number of simultaneous downloads (the one above has eight download slots). If all slots are taken, the bot adds the downloader to an internal queue. Eventually the bot uses the DCC protocol (as described above) to deliver the file. Additionally, most XDCC bots offer some convenience functions. It can be possible to query further information about individual files. The bot may also regularly inform users about the status of their download using notice messages. 3 Implementation This section will introduce the IRC client that we have written in C++ to collect statistical data about XDCC bots. 3.1 Overview Figure 2 shows the design of our software. An XML configuration file contains a list of IRC servers and a list of channels for each server. The client will try to connect to these servers and join the channels. It also specifies a number of identities (consisting of a nickname, a user name and a real name), which the client will use. The ConfigReader class is responsible for accessing the information in the configuration file. Similarly, gathered statistics are stored in an XML file. The StatisticsAggregator class provides an interface for writing to that file. Both classes use a simple XML library [8]. The Controller class initializes the program. It picks an identity at random (to support several instances of the client monitoring the same networks). Then it creates a BotLogic object and starts an additional thread for each server in the configuration file. That means there is a separate thread for each IRC connection. The BotLogic identifies XDCC bots and communicates with them to obtain their IP addresses and other information. For that purpose it has to connect to an IRC network; an IRC protocol implementation is needed. Every BotLogic object has an IRCWrapper object, which allows to send IRC messages 6
8 Figure 2: UML class diagram and provides other active IRC functionality. For the basic TCP connectivity Socket instances are used. The Socket class is a wrapper for the POSIX socket library with a simpler interface. Regarding the protocol stack (Socket, IRCWrapper), we wanted the code to be easily reusable. For that reason the IRCWrapper does not call any BotLogic member functions when IRC messages are received. Instead, objects that need to be notified of IRC events have to implement the IRCListener interface. This is similar to the observer design pattern [1]. Data obtained by the BotLogic is forwarded to the StatisticsAggregator. The StatisticsAggregator uses the AdditionalInformationCollector class (AIC) to get more detailed information about a bot. Given an IP address and a port number, the AIC tries to identify the country the bot is from. For that purpose the IP address database GeoIP [13] is used, which is reliable and fast, since it does not depend on remote servers. Another way to map IP addresses to countries would have been to query whois servers, but this is slow and the format of the query results can vary wildly, which makes them hard to parse, so lookup via the GeoIP database was chosen for this purpose. The AIC will also try to use the SinFP [9] fingerprinting engine to determine the operating system of said bot, if an open port was provided. In the following three sections some specific implementation details are discussed. 3.2 IRC For the project s purpose it was not necessary to implement the entire IRC protocol. First we will list the required IRC commands to illustrate some im- 7
9 plementation issues. Then we will explain how the IRC client responds to disruptions Required IRC messages The following commands correspond fully to RFC 1459 [7]; fortunately, all IRC networks we encountered seem to comply with the specification as far as basic client-to-server commands go. All the commands described in section are necessary: user command: Any user name/ real name can be used. Most servers additionally query the user name using the Identification Protocol (RFC 1413 [7]); however, we did not come across networks that enforce a reply. If necessary, an external Ident server can always be used. join command: Whenever a client successfully joins a channel, it is sent one or more rpl namreply messages, that list the nicknames and user modes of all users on the channel. These replies could be used to identify bots right away. nick, quit, ping and pong command. As for the mode command, we are only interested in the user modes +v (bot identification) and +b ( ban ). The privmsg command/ctcp requests are required for the communication with XDCC bots as described in section The notice command/ctcp replies are needed to answer well-known CTCP requests (see section 2.2.1). Many IRC servers use these requests to inspect new clients, but a reply does not seem to be mandatory. To be on the safe side, we have implemented an automated version reply, which claims that the mirc client [14] is running. The whois / whowas command has been implemented because it can be used to query additional data about identified bots Persistency For data collection the IRC client needs to monitor IRC channels for several hours, maybe even days when bot uptimes are measured. Therefore it is important that the client can deal with disruptions without user interaction. When the IRC server that the client is connected to fails, the TCP connection will be lost. The problem may be temporary (for example, when the server reboots), so the client should try to reconnect for some amount of time. After that, the client should try to connect to a different server (of the same network). In our implementation one alternate server can be set in the configuration file. Some networks will not allow a reconnecting client to use the nickname it formerly had. This is an anti-abuse mechanism [4]. Because of this the client should also be able to pick an alternate nickname. After successful reconnection all channels have to be rejoined. 8
10 3.3 Bot communication This section explains how the BotLogic class obtains IP addresses and other data, and how it is affected by measures against automated XDCC software Data collection The first task is the identification of XDCC bots. As described in section 2.3 bots advertise their files in privmsg messages. Therefore bots can be identified by searching incoming privmsg messages for typical character strings, such as To request a file. It is unlikely that a user that is not an XDCC bot would send such a message. Considering that on warez channels bots are usually the only users with mode +v, bots can also be identified by their user mode. However, this method seems less safe and so far our client does not rely on it. The PME [17] library is used to sift through the privmsg messages. The advertisements also contain potentially interesting statistics. Currently the sum of the file sizes (all offered files), the amount of transferred data in total, and the bandwidth usage (current usage and peak usage) are recorded. That data is not necessarily correct; but the people who distribute or run XDCC bots have no motive to manipulate the statistics. Our client also measures the bots uptimes by recording join, part and quit events. The whois command is not used; whois replies contain only the bot s user name and real name. As mentioned before, such information is not reliable at all. The returned hostname is normally masked and useless. The most important information for us is the bots IP addresses. The BotLogic obtains IP addresses as follows: 1. Identify a bot and send the trigger message (see section 2.3). All XDCC bots that we came across used the same trigger; that means it is not necessary to scan advertisements for the trigger message. 2. Proceed as described in section 2.2.2: (a) If the bot uses active DCC, it will send its IP address in a CTCP request. We observed that some bots send an incorrect IP address (for example a private network address [5]). Therefore our client connects to the bot to verify the address. Note that this behavior was not implemented until the end of the project; that means most of the collected data does contain those incorrect IP addresses. (b) If the bot uses passive DCC, a TCP connection is established as well. Then the IP address is queried from the connected socket. All passive DCC bots we encountered used the Reverse/ Firewall DCC mechanism (see section 2.2.2). It is not sufficient to read the IP address from the notice message that is usually sent in response to the trigger command, as not all XDCC bots send that message Measures against bots Even though our client does not attract attention from operators for the most part, it is sometimes mistaken for Bottler [2] or similar automated XDCC software. The small IRC network Elemental IRC [16] discourages from using that 9
11 kind of software by sending notice messages with the following content: This is just a reminder that any form of Automatic XDCC Software, (eg. Bottler, XDCC Catcher etc.) is NOT permitted here. There are scripts which will detect what you are running and ban accordingly. This is to ensure that all users recieve an equal avaliability to Files. If :you have a FSERV or XDCC and notice that you are being hammered, please notify a member of network staff (with logs) who will deal with it. [sic] So far our client gets kicked and banned occasionally, but rarely. If this becomes a problem, the code could be changed so that the bots are contacted less frequently. Other networks use a less aggressive mechanism. If a client sends messages to a large number of different targets within a short period of time, the messages are not delivered. Instead, the server responds with an error message. 3.4 Statistics aggregation As noted before, the StatisticsAggregator is used to collect information about bots in an XML file. During implementation, a number of robustness considerations had to be made, since loss of collected data is to be avoided, even in cases where problems occur (no disk space left, irregular termination, etc.). It was also necessary to implement means for the StatisticsAggregator to recognize known bots and add data about events to the relevant identity Robustness Generally, even in the case of multiple connections to multiple servers, only one instance of the StatisticsAggregator should be used, but it can handle be instantiated more than once. Since having more than one instance can lead to problems (e.g. multiple instances with the same filename), some functionality is disabled in these cases, and later instances pointing to a statistics file which is already in use, redirect their method calls to the first instance which uses this file. To prevent failed disk writes from destroying previously written statistics, on saving a temporary file with the current statistics is created, and, if writing the statistics to disk was successful, atomically renamed/moved into the place of the destination file. This way, in the case of a full disk (or other failures), the original statistics will not be overwritten by a partial, corrupt XML file. Since the StatisticsAggregator is expected to be used in a threaded environment (multiple servers), it makes heavy use of semaphores to ensure thread safety; concurrently registered events will not try to modify the XML structure in memory at the same time. Some events might prompt the StatisticsAggregator to do more time intensive work (e.g. OS fingerprinting in the case of a received DCC send). For these procedures, separate worker threads are spawned, to prevent the BotLogic, and general IRC parts of the program, from having to wait for these jobs to complete. Also, some signals (SIGTERM, SIGINT, SIGABRT, SIGSEGV) are caught to enable the StatisticsAggregator to save all currently collected data in the case of irregular termination. In the case of a caught SIGSEGV, an additional.segv suffix is appended to the statistics filename, to prevent possibly corrupted data from overwriting the last known good state. 10
12 Additionally, the signal SIGHUP is caught, to provide an easy to use interface for prompting the StatisticsAggregator to save the current statistics in environments where no interactive user interface is usable Bot recognition The StatisticsAggregator keeps a table of known bots nicknames, usernames and hostnames, mapped to the corresponding bot. By default, when receiving an event or being asked whether a certain bot is known, it will check the nickname map. If nothing was found, the hostname map will be consulted. Unless explicitly configured that way, the username map will not be used, since many XDCC bots have use the same string as ident, while nicknames and hostnames should be mostly unique. Functionality to change lookup order on a global, per server, and per channel basis is also included Event logging The StatisticsAggregator provides logging facilities for the following events: Seen bot: Triggered when a known or unknown bot was seen sending a message. Join: Triggered when a known bot has joined a channel. Part: Triggered when a known bot has left a channel. Quit: Triggered when a known bot has disconnected from a server. Stats: Triggered when a known bot has advertised statistics about its bandwidth, offered data, or transferred data. Received DCC send: Triggered when the client has received a DCC send request from a bot. This will make the StatisticsAggregator invoke the AdditionalInformationCollector to retrieve information about the OS running on the bot s host and about the country the bot is from. Each logged event will be added to the identity of the bot that triggered it, including a timestamp and any additional information, that might be appropriate. 4 Results 4.1 Methodology Data collection was carried out over multiple (sometimes overlapping) sessions and on multiple different computers, where in each session a batch of different channels on multiple servers was observed. In total, 68 channels on 18 servers were observed. The target channels were selected, by searching for channels with a high number of XDCC bots on Packetnews [15], as well as searching for channels with high numbers of users (popular channels) with topics indicating the presence of XDCC bots on Netsplit [6]. 11
13 Figure 3: Number of detected bots, time seconds after the start of a collection session. Data collection was carried out over a period of about 242 hours (10 days). With overlap between sessions removed, the data collection period is 226 hours (9.4 days). After the first data collection sessions, it was noticed that the fingerprinting mechanism gave quite unreliable results (see the Operating systems section for more information). Since using the fingerprinting engine requires some special conditions (e.g. the client running with root privileges), it was not enabled for most of the later data collection sessions. Since at the start of data collection all bots in a channel are unknown, new bots are detected at a much higher rate in the beginning. Later, only hosts with fresh bots, or hosts that were previously offline, are detected as new bots. As can be seen in figure 3, a big number (in this example, approximately 1 4 ) of bots is detected right at the beginning. Afterwards the growth roughly corresponds to a somewhat slow growing linear function. This means that starting new collection sessions on so far unobserved or newly found channels will generally yield a higher number of collected bots, than observing a single channel set for a longer time. The collected data includes the following information: Nickname, ident/username, and hostname of each bot, as sent by the server in IRC messages. Online and offline events, with timestamp and any additional information like part-messages, and channel. IP addresses, countries of origin, and fingerprinting results of bots, including timestamp of the collection. 12
14 Figure 4: Distribution of XDCC bots by country (Top 10) Bandwidth, storage, and transfer statistics of bots as advertised by them. 4.2 Diagram notes At this time, we observed a total of 1766 unique bots. Now some of the statistics, which can be extracted from the collected data shall be shown. The country UNKNOWN represents all bots, for which no country information could be retrieved from the IP address. These bots sent IP addresses from the ranges 10.*, *, *, and 192.*. These bots are most likely misconfigured. Still, some of them claim to have transferred a non-zero amount of data, which leads one to assume, that they were recently reconfigured or the way the hosts are connected to the internet was changed. Since not every bot advertised all possible information about itself (amount of offered data, transferred data, record data rate), the total number of bots will vary over the different diagram types. Data offered statistics were advertised by a total of 748 bots, data transferred statistics by 442 bots, record data rate statistics by 649 bots. We have online time data for 1637 bots with country information. Fingerprinting results are available for 393 bots. For the most diagrams, countries with less than 6 (arbitrarily chosen threshold) bots were ignored, since they are mostly irrelevant for meaningful observation. In the case of mean online time (Figure 11), countries with less than 10 bots were ignored. This higher threshold was chosen to compensate for the bigger data set. Other is a catchall for countries which did not make it into the diagram. 4.3 Regions As can be seen from the pie chart (Figure 4), the highest number of bots is in the USA and South Korea, followed by Germany, the UK, Taiwan, China, 13
15 Figure 5: Total amount of data offered by country in GiB (Top 10) Japan and France. Now for some more detailed information about offered/transferred data per country. 4.4 Offered and transferred data Most XDCC bots publicly advertise the amount of data they offer, as well as the amount of data transferred by them so far. These statistics will give an overview, about how active the bots from different countries are. Looking at these charts, it will become apparent, that South Korean bots store and transfer a vast majority of data. South Korea is at the top of each single data offered/transferred diagram. Even though the USA contain a higher number of bots, they share the lower places with Germany, the UK, Japan, France, Canada, Taiwan, the Russian Federation, Turkey, Spain and Brazil. In the charts pertaining to the total amount of data (figures 5 and 6), the bots from South Korea transfer/offer almost twice as much as the USA, which holds the second place in both cases. The differences in the charts for mean amount of data offered and transferred per bot (figures 7 and 8) are smaller. The bots from South Korea are still at the top, while the USA rank lower than on the charts before, which can be attributed to the fact that, while they contain a large number of bots, those bots are not used all that much. 4.5 Record data rate The bots also publish the record transfer speed in their advertisements. 14
16 Figure 6: Total amount of data transferred by country in GiB (Top 10) Figure 7: Mean amount of data offered per bot in MiB (Top 10) 15
17 Figure 8: Mean amount of data transferred per bot in MiB (Top 10) Figure 9: Total record data rate of all bots in MiB/s (Top 10) 16
18 Figure 10: Mean record data rate of all bots in KiB/s (Top 10) In the case of the total record data rate diagram (figure 9), the total record speed of South Korean bots is almost six times that of the bots in the USA, who are placed 2nd. This coincides with the fact, that fast broadband connectivity is very common is South Korea. The relatively high total record data of the USA is mainly made up from the large number of bots in that country. Third place is taken by currently misconfigured bots, which probably worked some time ago. Taiwan and Japan (4th and 5th place respectively) both contain a comparatively low number of bots, but still have a high total record data rate, which again stems from the high availability of fast broadband connectivity in both countries. [19] [20] The mean record data rate diagram (figure 10) is, again, lead by South Korea by quite some margin. On average, South Korean bots have twice the record rate as those from Taiwan, which is placed second. Japan is placed third. In this diagram it becomes apparent, that bots from the USA are generally slower than those in South Korea, Taiwan and Japan, and the USA only placed high in the total record data rate diagram, because of its high number of bots. Bots from the USA have about half the mean record data rate as those from Japan. Obviously a high number of fast broadband connections in a country leads to faster bots and, as can be seen in the case of South Korea, make PCs from the country a more common/popular target for attacks. 4.6 Online time In this diagram, countries with 10 or less bots were excluded, since they are not really statistically relevant in this significantly bigger data set. As can be seen in figure 11, the bots from Spain were the most stable bots (4.65 hours mean online time). Those from South Korea were also among the 17
19 Figure 11: Mean online time per bot in hours. (Top 10) most stable bots (3.17 hours mean online time, fourth place), while those from the USA ranked a good bit lower (1.97 hours mean online time). Bots from the Russian Federation (3.14 hours), China (2.66 hours), France (2.61 hours), Canada (2.2 hours) and Germany (2.11 hours) are between the USA and South Korea, as far as reliability/online time goes. 4.7 Operating systems Now we shall take a look at the OSes run by the bot hosts. It quickly becomes apparent, that the OS fingerprinting was less than perfect. The questionable results were mostly Linksys routers, which really should not run XDCC bots and were probably misidentified for some reason. Still, it is quite obvious that most of the owned (compromised/hacked) machines run MS Windows (esp. Windows 2000). There are also a few bots running Linux and other UNIX like OSes. These might be just slightly unusual botnet zombies, or they could be machines of people voluntarily running an XDCC bot for some reason. 4.8 Conclusion While the USA have the largest share of bot running computers (16.4%), South Korea (13.4%) and other Asian countries (Taiwan, China, Japan) also contain a significant number of bots (about 26.5% in total). Considering the fact, that in the USA, there are about 211M internet connections [10], while in South Korea there are only 34M, the proportion of botrunning PCs in South Korea is much higher. 18
20 Figure 12: OSes of computers running XDCC bots (Top 10) Total data offer/transfer statistics (about twice as much data offered/transferred as bots from the USA), as well as the data rate statistics (highest record data rate by a big margin) lead us to consider the South Korean bots as the most active/actively used ones. From this, we can draw the following conclusions: Our data supports the assumption, that a very significant number of bots come from South Korea (and Asia in general). This is especially meaningful, since those bots are the most active. Most of the bots seem to run on MS Windows machines. This corresponds to our assumptions. Computers from countries with a high number of very fast broadband connections seem to be preferred targets for attacking and running XDCC bots one them. 19
21 References [1] Bruce Eckel and Chuck Allison. Thinking In C++. Volume 2: Practical Programming. Prentice-Hall, [2] %28IRC client%29. [3] Client-to-Client. [4] Relay Chat#Nick.2Fchannel delay. [5] networks. [6] [7] [8] mathematics.net/tools/xmlparser.html. [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] KOR.pdf International Telecommunication Union. Broadband korea: Internet case study, [19] MAIT. Broadband in taiwan, [20] Yasu Taniwaki. Broadband deployment in japan,
Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency
Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Bachelor Thesis Fabian Gremper ETH Zürich [email protected] May 17, 2011 September 25, 2011 Supervised by:
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
IRC - Internet Relay Chat
IRC - Internet Relay Chat Protocol, Communication, Applications Jenisch Alexander [email protected] Morocutti Nikolaus [email protected] Introduction Facts. How it works. IRC specifiaction. Communication.
/helpop <command> you can get the detailed help for one single command.
These are the Commands you need, to enter or leave a channel or to change your nick. You can use some of these commands every day or maybe more often. They control how you appear in IRC, and allow you
Troubleshooting / FAQ
Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
The ScoutLink Operators Manual. For IRC Operators
The ScoutLink Operators Manual For IRC Operators 1 Table of Contents 1 Table of Contents... 2 2 Introduction... 3 3 OPER... 4 4 #Services.log... 4 5 HELPSYS... 5 6 SAMODE... 5 6.1 Regular channel modes...
Monitoring Microsoft Exchange to Improve Performance and Availability
Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Компјутерски Мрежи NAT & ICMP
Компјутерски Мрежи NAT & ICMP Riste Stojanov, M.Sc., Aleksandra Bogojeska, M.Sc., Vladimir Zdraveski, B.Sc Internet AS Hierarchy Inter-AS border (exterior gateway) routers Intra-AS interior (gateway) routers
Server Setup. Basic Settings
Server Setup Basic Settings CrushFTP has two locations for its preferences. The basic settings are located under the "Prefs" tab on the main screen while the advanced settings are under the file menu.
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
The Problem with Faxing over VoIP Channels
The Problem with Faxing over VoIP Channels Lower your phone bill! is one of many slogans used today by popular Voice over IP (VoIP) providers. Indeed, you may certainly save money by leveraging an existing
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
orrelog Ping Monitor Adapter Software Users Manual
orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
Communication Protocol
Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Classification: TLP-GREEN RISK LEVEL: MEDIUM Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS Release Date: 6.1.16 1.0 / OVERVIEW / Akamai SIRT is investigating a new DDoS reflection
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Introduction. How does FTP work?
Introduction The µtasker supports an optional single user FTP. This operates always in active FTP mode and optionally in passive FTP mode. The basic idea of using FTP is not as a data server where a multitude
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun [email protected] Lab Jaringan Komputer (C-307) Table of
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Healthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Aculab digital network access cards
Aculab digital network access cards Adding and Using IPv6 Capabilities Guide Revision 1.0.2 PROPRIETARY INFORMATION Aculab Plc makes every effort to ensure that the information in this document is correct
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
[AthenaIRC v2.3.4] coded by _Stoner ----- -Documentation- -----
[AthenaIRC v2.3.4] coded by _Stoner ----- -Documentation- ----- Athena IRC Bot Commands: Miscellaneous Commands!decrypt Decrypts a previously encrypted command(prevents IRC lurkers from seeing/interpreting
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Domain Name System (DNS) Services
12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Guideline for stresstest Page 1 of 6. Stress test
Guideline for stresstest Page 1 of 6 Stress test Objective: Show unacceptable problems with high parallel load. Crash, wrong processing, slow processing. Test Procedure: Run test cases with maximum number
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
LifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Highly Available AMPS Client Programming
Highly Available AMPS Client Programming 60East Technologies Copyright 2013 All rights reserved. 60East, AMPS, and Advanced Message Processing System are trademarks of 60East Technologies, Inc. All other
File Transfers. Contents
A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
AutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or
Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or desktop for their use while in training. If a recruit
Features Overview Guide About new features in WhatsUp Gold v12
Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...
AIMMS The Network License Server
AIMMS The Network License Server AIMMS AIMMS 4.0 July 1, 2014 Contents Contents ii 1 The Aimms Network License Server 1 1.1 Software requirements........................ 1 1.2 Installing and deploying
CrushFTP User Manager
CrushFTP User Manager Welcome to the documentation on the CrushFTP User Manager. This document tries to explain all the parts tot he User Manager. If something has been omitted, please feel free to contact
INTRODUCTION TO VOICE OVER IP
52-30-20 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO VOICE OVER IP Gilbert Held INSIDE Equipment Utilization; VoIP Gateway; Router with Voice Modules; IP Gateway; Latency; Delay Components; Encoding;
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Send Email TLM. Table of contents
Table of contents 1 Overview... 3 1.1 Overview...3 1.1.1 Introduction...3 1.1.2 Definitions... 3 1.1.3 Concepts... 3 1.1.4 Features...4 1.1.5 Requirements... 4 2 Warranty... 5 2.1 Terms of Use... 5 3 Configuration...6
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
PageR Enterprise Monitored Objects - AS/400-5
PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business
& Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
NEW AND IMPROVED! INSTALLING an IRC Server (Internet Relay Chat) on your WRT54G,GS,GL Version 1.02 April 2 nd, 2014. Rusty Haddock/AE5AE
INSTALLING an IRC Server (Internet Relay Chat) on your WRT54G,GS,GL Version 1.02 April 2 nd, 2014 Rusty Haddock/AE5AE NEW AND IMPROVED! - WHAT THIS DOCUMENT IS. 1 / 12 This document will attempt to describe
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Managing Central Monitoring in Distributed Systems
Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
