BOT, IRCBot
The term BOT stands for robot, also known in the media as a zombie
and is in part, a trojan. The purpose of the BOT is for use in an
attack against a single host using the Denial of Service (DOS)
method of overloading a network. The BOT is a small file on a
computer which listens for its owner to instruct it what to do.
BOTs most often live on Windows 9x machines which have high-speed
internet connections such as Cable and DSL. When grandma starts the
computer with that new DSL line, she has no idea a trojan lives in
her system communicating with its owner over the network.
IRCBots log into an irc channel and silently wait for instructions.
The owner will issue a command for all BOTs to PING a host on the
internet. If the owner has up to 200 BOTs all connected to high-speed
internet connections, the host will be flooded with network traffic
and will be unable to serve e-mail, webpages, etc... Thus, the server
is denied from its usual service (DoS). Installing the BOTs on the
Microsoft machines used by the casual user is another topic, they
are most often distributed in Freeware and Shareware software, thus
giving it the trojan methodology.
This type of attack is a Denial of Service attack. More specifically,
this particular attack is a Distributed Denial of Service attack or
DDoS. It is distributed because many machines share in the offensive
attack.
To scan for IRCBots:
IRC BOT detection:
c:\>netstat -an | find ":6667"
check for client IDENT server:
c:\>netstat -an | find ":113 "
Remember that by logging into an IRC channel and listening, the BOT
can bypass NAT protection. It is a client in the IRC channel,
initiating the connection thus the NAT device opening the RX port
for outside contact and command control.