Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fighting spam by finding and listing Exploitable Servers.

Similar presentations


Presentation on theme: "Fighting spam by finding and listing Exploitable Servers."— Presentation transcript:

1 Fighting spam by finding and listing Exploitable Servers.

2 What is spam…? Why is it a problem…? Why is it a problem…? Where do viruses fit in…? Where do viruses fit in…? Spyware, what is it what does it do…? Spyware, what is it what does it do…? “Phishing”, what is it…? “Phishing”, what is it…? The merging of technologies. The merging of technologies. The new attack vector. The new attack vector. What can be done…? What can be done…?

3 Fighting spam by finding and listing Exploitable Servers. Unsolicited Bulk Email…? Unsolicited Commercial Email…? Unsolicited Commercial Email…? Unsolicited Promotional Email…? Unsolicited Promotional Email…? Not what we’re sending…? Not what we’re sending…? Unsolicited Email…? Unsolicited Email…? Objectionable Email…? Objectionable Email…? What the ACA tells us is spam…? What the ACA tells us is spam…?

4 Fighting spam by finding and listing Exploitable Servers.

5

6

7

8

9

10 All of the above….! Each message is spam in it’s own right. Each message is spam in it’s own right. Each poses it’s own dangers. Each poses it’s own dangers. We should be working to stop them all. We should be working to stop them all.

11 Fighting spam by finding and listing Exploitable Servers. Open Relays Proxy Servers Proxy Servers Spam “Bots” Spam “Bots” DoS “Bots” DoS “Bots” More sinister directions... More sinister directions... Spyware Spyware Key-loggers Key-loggers

12 Fighting spam by finding and listing Exploitable Servers. Open Relays, are they really a problem…? How about proxy servers….? How about proxy servers….? The risks: The risks: Open relays are diminished in numbers. Open relays are diminished in numbers. Proxies work both ways. Proxies work both ways. Proxy servers being delivered in spam. Proxy servers being delivered in spam.

13 Fighting spam by finding and listing Exploitable Servers. Tracking movements across the Net Tracking movements across the Net Demographics Demographics Parental Control Software Parental Control Software Surveillance Surveillance Key-logging Key-logging Complete user tracking Complete user tracking How can we get rid of it…? How can we get rid of it…?

14 Fighting spam by finding and listing Exploitable Servers. (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. How do we combat it…? How do we combat it…? What can we do when we get caught...? What can we do when we get caught...? How can we prevent it…? How can we prevent it…?

15 Fighting spam by finding and listing Exploitable Servers. Email viruses combining with exploits. Email viruses combining with exploits. Newer Trojans that avoid system calls to “hide”. Newer Trojans that avoid system calls to “hide”. Newer ones allow remote upload of software. Newer ones allow remote upload of software. Continually changing ports to avoid detection. Continually changing ports to avoid detection. Calling home, or using IRC servers. Calling home, or using IRC servers.

16 Fighting spam by finding and listing Exploitable Servers. Open Relays Open Relays Open Proxies Open Proxies Trojans Trojans Viruses Viruses Spyware Spyware What’s this all leading to….? What’s this all leading to….? Spam, Spam, Spam, and more Spam...! Spam, Spam, Spam, and more Spam...! So what is the new attack vector…? So what is the new attack vector…?

17 Fighting spam by finding and listing Exploitable Servers.

18

19 AHBLThe Abusive Hosts Blocking ListHits: 100910% BOGONScompletewhois.com: Bogon IP'sHits: 1441% BOPMBlitzed Open Proxy MonitorHits: 5106% CBLComposite Blocking ListHits: 301024% DRBLDistributed Realtime Blocking ListHits: 165311% DSBLDistributed Server Boycott ListHits: 296225% FIVETENLocal Blackholes at Five-TenHits: 590347% JIPPGMAJIPPG's Relay Blackhole ListHits: 1421% NJABLNot Just Another Bogus ListHits: 176916% NOMOREdr. Jørgen Mash's DNSblHits: 3383% ORDBOpen Relay DataBaseHits: 1670% PSBLPassive Spam Block ListHits: 11619% SBLSpamhaus Block ListHits: 6986% SORBSSpam and Open Relay Blocking SystemHits: 464342% SPAMBAGSpambagsHits: 116711% SPAMCOPSpamCopHits: 186817% SPAMRBLHits: 90% SPAMSITESpamware Peddler and SpamservicesHits: 50% SPEWSSpam Prevention Early Warning SystemHits: 155212% UCEPROTHits: 8808% WPBLWeighted Private Block ListHits: 7787% Which shows statistics mean nothing!

20 Fighting spam by finding and listing Exploitable Servers.

21


Download ppt "Fighting spam by finding and listing Exploitable Servers."

Similar presentations


Ads by Google