Create and sign a new botnet update

Assignment Help Other Subject
Reference no: EM131502412

Project: Defeating SkyNet - Part 2: Commanding the Legion

Introduction

In the first part, you created the base foundations of a botnet. Part 2 of the project extends upon this and implements some core security features most recently used in the Conficker worm. Using these cryptography methods, Conficker was able to remain out of the control of hackers, well-funded organisations and even the US government.

The new features for SkyNet include:

  • Using public key cryptography to ensure only data or updates sent out by the botnet master are downloaded by the bot.
  • Using public key cryptography to ensure no-one but the botnet master can decrypt valuable data sent by the bot

SkyNet will be using advanced cryptography to protect itself against well-funded organisations, government agencies and other hackers. What you will be implementing here is inspired by real world cases such as the Conficker work. To have any chance of defeating such a threat, you need to understand how they defend themselves.

Note that you will use the same repository and code base from Project Part 1 in Part 2.

Part 2: Protecting the Castle

1. Securely Updating SkyNet

In the previous part of the project, uploads were supplied to the bot via another bot using peer-to-peer (P2P) or a central website (pastebot.net). As you might have noticed, these updates were not verified in any secure way. By default, updates only needed to start with a specific string (Caesar) to be considered 'signed' from the botnet master. Any third parties with trivial reverse engineering knowledge would be able to realise this and create their own 'signed' updates.

You must devise a scheme where the botnet master is able to securely sign updates for SkyNet. Bots should perform this verification on updates retrieved via P2P or a website.

The exact mechanism by which this occurs is up to you, though some form of public key cryptography is suggested. Your signature scheme should also remain secure even when confronted with attackers who have access to significant resources. The scheme should also be secure even if an attacker reverse engineers your program or the source code for your bot is stolen or released.

2. Securely Transferring Valuable Data to the Botnet Master

As part of their operation, the bots in SkyNet collect valuable data that is then sent to the botnet master. In the current codebase, this valuable data is uploaded in plaintext to pastebot.net. As it is plaintext, the data could be read by anyone who is able to intercept or access these uploads.

You must devise a scheme where the bots are able to securely upload valuable data to pastebot.net. No-one but the botnet master should be able to read the contents of these uploads. The exact mechanism by which this occurs is up to you, though some form of public key cryptography is suggested.

3. Code Checklist             

  • Enable signing and verification for any botnet updates. This requires signing code in master_sign.py and verification code in the verify_file function in lib/files.py.
  • Ensure the upload_valuables_to_pastebot function securely encrypts the data so it's only accessible to the botnet master. You also need to modify master_view.py to allow the file to be decrypted and read by the botnet master.

You should be able to:

  • Create and sign a new botnet update
  • Test bot update verification by trying to download a legitimate update and a fraudulent update from pastebot.net
  • Test bot update verification when downloading updates via P2P
  • Upload valuables of arbitrary size to pastebot.net in an encrypted manner
  • Decrypt encrypted valuables of arbitrary size using the botnet master's private key

Your code should be well commented and in neat order.

4. Documentation

You are to write a two page design document outlining the security you implemented with your system. Your choices for authentication, confidentiality and integrity for the SkyNet botnet should be justified.

Specifically, you should provide a brief answer to these questions:

  • How do you ensure the only one who can send updates to SkyNet is the botnet master?
  • How do you protect the valuable information to ensure it can only be read by the botnet master? Remember that anyone can read the information uploaded onto pastebot.net.
  • How do you ensure the botnet updates signed by the botnet master cannot be forged or modified?
  • If SkyNet's botnet code is dismantled and/or the source code for it stolen, does your scheme become less secure?
  • Give an indication of how di?cult it would be for an adversary to take control of SkyNet when your protections are used.

5. Disclaimer

This is not an operational botnet nor do we intend you to create one. To defeat blackhat hackers, you must understand how they work and the tools they use. Recent botnets have used advanced computer science and crypto-graphic methods in order to remain secure from both hackers, well-funded organisations and even governments. These advanced methods are what we intend you to learn and what we believe will help you detect, prevent and disassemble such attacks in the future.

Attachment:- Assignment Files.zip

Reference no: EM131502412

Questions Cloud

Explain type of inventories given companies currently manage : Determine the types of inventories these companies currently manage and describe their essential inventory characteristics.
How did the proclamation of 1763 affect the perception : How do you think this proclamation influenced the future perceptions and relationships with Indians?
Discuss if any of sams actions subject to criminal liability : Identify if there is an intellectual property at issue here. If so, what type? Discuss if any of Sam's actions subject him to criminal liability.
Identify four different stakeholders : Identify four different stakeholders (feel free to be creative) in the Flint water crisis and explain why you consider them to be a stakeholder.
Create and sign a new botnet update : You should be able to: Create and sign a new botnet update and Upload valuables of arbitrary size to pastebot.net in an encrypted manner
What makes a good office design in your opinion : What makes a good office design, in your opinion? Which elements are most important to you when choosing an office design and why?
Large percentage of total assets : Suppose someone says that a relatively small percentage of Americans own a large percentage of total assets and that therefore the government.
An ethical analysis supporting each conclusion : Examine two potential solutions, including an ethical analysis supporting each conclusion, as well as any potential consequences.
Present an ethical problem confronted by starbucks : present an ethical problem confronted by Starbucks. You can choose one such ethical problem from the video.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd