SlideShare a Scribd company logo
6
Most read
10
Most read
12
Most read
CYBER THREAT
DNS FLOOD - DDOS ATTACK
DDOS ATTACK
• What is DDOS attack
• Distributed Denial of Service attack is also referred as DDOS is an attack to
bring down the online service of any system by overloading it with request or
ping
• Types of DDOS
• Volume based
• Protocol Based
• Application Based
DDOS – DNS FLOOD ATTACK
• The attacker targets a DNS (Domain
Name System) Server of an
organization or a geographical zone
to utilize its resources
• The legitimate users/queries to the
DNS Server will not be resolved and
resulting in Denial of Service
DDOS ATTACK - MIRAI BOTNET
MIRAI BOTNET
MELBOURNE IT – DDOS ATTACK
MIRAI BOTNET
1. Scanning phase
2. Brute Force
3. Report Server
4. Malware Infection
5. Deleting Presence
6. Execution - Attack
7. After Attack
MIRAI BOTNET
Scanning phase
The first stage is to
scan the IP Addresses
of potential victim
system and the hacker
ping random IP
addresses to find the
genuine ones.
BRUTE FORCE
Here it tries to Brute force the victim devices and it uses default password,
majorly on IOT Devices
REPORT SERVER & MALWARE INFECTION
Once Mirai has
successfully login for
the first time, it will
scan and send the
system IP and the
user credentials to the
Report server
REPORT SERVER & MALWARE INFECTION
Loader program will
asynchronously infect these
vulnerable devices by
• Logging in
• Determine the system
environment and
• Finally will download and
execute the architecture-
specific malware
MIRAI – DELETING PRESENCE
• Mirai try to conceal
its presence after
infecting the device
• It will delete the
downloaded binary
and obfuscating its
process name into
some pseudorandom
alphanumeric string.
ATTACK - MIRAI
Once the Zombie machine is created, two major steps for
attack is
• Zombie machine setup
Networking and open
PF_INET socket of TCP
and use port 48101 to
listen to network traffic
• When attack is launched, it
telnet to the client and start
FLOODING
AFTER ATTACK
• Mirai use Telnet to communicate to C2 Server, so after the attack
is launched it will kill other processes bound to TCP/22 or
TCP/23, as well as processes associated with competing bot
infections
• It also simultaneously scan for new victims
DEFENSE & FORENSIC
MIRAI Prevention and Mitigation
FIVE STAGES OF DEFENSE
Training and Process plays an very important role in Defending against any cyber
attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well
aware of them and have followed a proper procedure they can identify the Malware
• Any Linux ELF files have a folder as /watchdog/
Awareness
FIVE STAGES OF DEFENSE
Training and Process plays an very important role in Defending against any cyber
attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well
aware of them and have followed a proper procedure they can identify the Malware
• Any Linux ELF files have a folder as /watchdog/
• Any Directory with name /dvrHelper
Awareness
FIVE STAGES OF DEFENSE
Training and Process plays an very important role in Defending against any cyber
attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well
aware of them and have followed a proper procedure they can identify the Malware
• Any Linux ELF files have a folder as /watchdog/
• Any Directory with name /dvrHelper
• Block TCP port 48101
Blocking Access
Awareness
FIVE STAGES OF DEFENSE
• DNS Detection
• DNS Logs must be examined for any
abnormalities and as shown in the graph
any spike, should be examined
• Drop Quick Retransmission – any
legitimate client will not send same
queries again soon.
RFC1034 ad RFC1035 suggests, if
retransmission is coming from same source it
must be dropped
Blocking Access
Awareness
Finding Adversaries
FIVE STAGES OF DEFENSE
Mirai Vulnerability Scanner
• Simple, yet powerful tool to identify
Mirai Vulnerability. It is provided by
Incapsula
• Cisco NetFlow – Powerful tool to
monitor Network traffic such as:
• Source IP address
• Destination IP address
• Source port
• Destination port
• Layer 3 protocol
• TOS byte
• Input interface
Blocking Access
Awareness
Finding Adversaries
Protecting Target Access
FIVE STAGES OF DEFENSE
• Mirai Vulnerability Scanner
• Simple, yet powerful tool to identify
Mirai Vulnerability. It is provided by
Incapsula
• Cisco NetFlow – Powerful tool to monitor
Network traffic such as:
• Source IP address
• Destination IP address
• Source port
• Destination port
• Layer 3 protocol
• TOS byte
• Input interface
Blocking Access
Awareness
Finding Adversaries
Protecting Target Access
FIVE STAGES OF DEFENSE
DDOS Mitigation plans
• Geographic Infrastructure
Diversity
• Hybrid Cloud Infrastructure
• Multi WAN Entry point for Large
Enterprise and help from ISP to re-
route the traffic
• Get help from experts
Blocking Access
Awareness
Finding Adversaries
Protecting Target Access
Mitigation Plans
DDOS ATTACK - MIRAI BOTNET

More Related Content

PPTX
DNS spoofing/poisoning Attack
PDF
IoT Security, Mirai Revisited
PPTX
The Mirai Botnet and Massive DDoS Attacks of October 2016
PPTX
DoS or DDoS attack
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Wireshark
PPTX
DDoS - Distributed Denial of Service
PPTX
Intrusion Prevention System
DNS spoofing/poisoning Attack
IoT Security, Mirai Revisited
The Mirai Botnet and Massive DDoS Attacks of October 2016
DoS or DDoS attack
Denial of Service Attacks (DoS/DDoS)
Wireshark
DDoS - Distributed Denial of Service
Intrusion Prevention System

What's hot (20)

PPTX
Ransomware Attack.pptx
PPT
IDS and IPS
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Understanding NMAP
PPTX
Basics of Denial of Service Attacks
PDF
12 types of DDoS attacks
PDF
Ch 5: Port Scanning
PDF
Wireless Hacking
PPTX
Network scanning
PPT
DDoS Attacks
PPT
Honeypot honeynet
PPTX
NMAP - The Network Scanner
PDF
DNS (Domain Name System)
PPTX
Malware & Anti-Malware
PPT
Introduction to Malware
PPT
Proxy servers
PPTX
Recon with Nmap
PPT
DDoS Attack PPT by Nitin Bisht
Ransomware Attack.pptx
IDS and IPS
Overview of the Cyber Kill Chain [TM]
Understanding NMAP
Basics of Denial of Service Attacks
12 types of DDoS attacks
Ch 5: Port Scanning
Wireless Hacking
Network scanning
DDoS Attacks
Honeypot honeynet
NMAP - The Network Scanner
DNS (Domain Name System)
Malware & Anti-Malware
Introduction to Malware
Proxy servers
Recon with Nmap
DDoS Attack PPT by Nitin Bisht
Ad

Similar to DDOS ATTACK - MIRAI BOTNET (20)

PPTX
DDOS ATTACKS
PPTX
Cyber Security Terms
PPTX
How to stay protected against ransomware
PDF
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
PPTX
Information about malwares and Attacks.pptx
PDF
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
PPTX
Hacking by Pratyush Gupta
PPT
Security and Linux Security
PPTX
Botnets Attacks.pptx
PDF
(130119) #fitalk apt, cyber espionage threat
PPTX
PDF
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
PPTX
UTM (unified threat management)
PPT
Hacking tutorial
PPTX
Lecture 7 Attacker and there tools.pptx
PPT
Fight fire with fire draft
PPTX
Network Penetration Testing
PPT
PPTX
Ids 009 network attacks
DDOS ATTACKS
Cyber Security Terms
How to stay protected against ransomware
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Information about malwares and Attacks.pptx
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Hacking by Pratyush Gupta
Security and Linux Security
Botnets Attacks.pptx
(130119) #fitalk apt, cyber espionage threat
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
UTM (unified threat management)
Hacking tutorial
Lecture 7 Attacker and there tools.pptx
Fight fire with fire draft
Network Penetration Testing
Ids 009 network attacks
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...

DDOS ATTACK - MIRAI BOTNET

  • 1. CYBER THREAT DNS FLOOD - DDOS ATTACK
  • 2. DDOS ATTACK • What is DDOS attack • Distributed Denial of Service attack is also referred as DDOS is an attack to bring down the online service of any system by overloading it with request or ping • Types of DDOS • Volume based • Protocol Based • Application Based
  • 3. DDOS – DNS FLOOD ATTACK • The attacker targets a DNS (Domain Name System) Server of an organization or a geographical zone to utilize its resources • The legitimate users/queries to the DNS Server will not be resolved and resulting in Denial of Service
  • 5. MIRAI BOTNET MELBOURNE IT – DDOS ATTACK
  • 6. MIRAI BOTNET 1. Scanning phase 2. Brute Force 3. Report Server 4. Malware Infection 5. Deleting Presence 6. Execution - Attack 7. After Attack
  • 7. MIRAI BOTNET Scanning phase The first stage is to scan the IP Addresses of potential victim system and the hacker ping random IP addresses to find the genuine ones.
  • 8. BRUTE FORCE Here it tries to Brute force the victim devices and it uses default password, majorly on IOT Devices
  • 9. REPORT SERVER & MALWARE INFECTION Once Mirai has successfully login for the first time, it will scan and send the system IP and the user credentials to the Report server
  • 10. REPORT SERVER & MALWARE INFECTION Loader program will asynchronously infect these vulnerable devices by • Logging in • Determine the system environment and • Finally will download and execute the architecture- specific malware
  • 11. MIRAI – DELETING PRESENCE • Mirai try to conceal its presence after infecting the device • It will delete the downloaded binary and obfuscating its process name into some pseudorandom alphanumeric string.
  • 12. ATTACK - MIRAI Once the Zombie machine is created, two major steps for attack is • Zombie machine setup Networking and open PF_INET socket of TCP and use port 48101 to listen to network traffic • When attack is launched, it telnet to the client and start FLOODING
  • 13. AFTER ATTACK • Mirai use Telnet to communicate to C2 Server, so after the attack is launched it will kill other processes bound to TCP/22 or TCP/23, as well as processes associated with competing bot infections • It also simultaneously scan for new victims
  • 14. DEFENSE & FORENSIC MIRAI Prevention and Mitigation
  • 15. FIVE STAGES OF DEFENSE Training and Process plays an very important role in Defending against any cyber attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well aware of them and have followed a proper procedure they can identify the Malware • Any Linux ELF files have a folder as /watchdog/ Awareness
  • 16. FIVE STAGES OF DEFENSE Training and Process plays an very important role in Defending against any cyber attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well aware of them and have followed a proper procedure they can identify the Malware • Any Linux ELF files have a folder as /watchdog/ • Any Directory with name /dvrHelper Awareness
  • 17. FIVE STAGES OF DEFENSE Training and Process plays an very important role in Defending against any cyber attack, in our case of Mirai Botnet, Mirai leaves signature and if the Admin is well aware of them and have followed a proper procedure they can identify the Malware • Any Linux ELF files have a folder as /watchdog/ • Any Directory with name /dvrHelper • Block TCP port 48101 Blocking Access Awareness
  • 18. FIVE STAGES OF DEFENSE • DNS Detection • DNS Logs must be examined for any abnormalities and as shown in the graph any spike, should be examined • Drop Quick Retransmission – any legitimate client will not send same queries again soon. RFC1034 ad RFC1035 suggests, if retransmission is coming from same source it must be dropped Blocking Access Awareness Finding Adversaries
  • 19. FIVE STAGES OF DEFENSE Mirai Vulnerability Scanner • Simple, yet powerful tool to identify Mirai Vulnerability. It is provided by Incapsula • Cisco NetFlow – Powerful tool to monitor Network traffic such as: • Source IP address • Destination IP address • Source port • Destination port • Layer 3 protocol • TOS byte • Input interface Blocking Access Awareness Finding Adversaries Protecting Target Access
  • 20. FIVE STAGES OF DEFENSE • Mirai Vulnerability Scanner • Simple, yet powerful tool to identify Mirai Vulnerability. It is provided by Incapsula • Cisco NetFlow – Powerful tool to monitor Network traffic such as: • Source IP address • Destination IP address • Source port • Destination port • Layer 3 protocol • TOS byte • Input interface Blocking Access Awareness Finding Adversaries Protecting Target Access
  • 21. FIVE STAGES OF DEFENSE DDOS Mitigation plans • Geographic Infrastructure Diversity • Hybrid Cloud Infrastructure • Multi WAN Entry point for Large Enterprise and help from ISP to re- route the traffic • Get help from experts Blocking Access Awareness Finding Adversaries Protecting Target Access Mitigation Plans