Bypassing Sanboxes for fun!!
|
|
|
- Merilyn Johnston
- 10 years ago
- Views:
Transcription
1 Bypassing Sanboxes for fun!! Profit will be realised by sandboxes vendors Paul Jung!
2 2 Malware todays Army of droppers are spreaded through spam, phishing With packing every malware is nearly unique. Antiviruses are useless in this case. Unpacking every sample is really time consuming Cloacking! layer Evil code
3 3 Sanboxes as a device It Run, it Flags; Alert! Alert! Alert! Alert! Alert! Alert!
4 4 Sandboxes todays Malware sandboxes run the Malware May use several os & software versions Hook user / (kernel) side api calls. Capture network traffic. Rely heavily on virtualisation.
5 5 Why detecting Sandboxes Runs only on the desired target Slows down the poor reverser Gains time for the infection campaign
6 6 Sandboxes boxes! Trend Deep Dis FireEye Cuckoo (Malwr) ThreatExpert Checkpoint ThreatCloud Comodo Xandora Joe Sandbox Anubis
7 7 Sandboxes boxes! Trend Deep Dis FireEye Cuckoo (Malwr) ThreatExpert Checkpoint ThreatCloud Comodo Xandora Joe Sandbox Anubis
8 8 How to detect! a sandbox?
9 9 Seek 4 Virtualization Kvm / Proxmox Virtual Box (Trend Deep, Joe) «HomeMade» (Fireeye) Xen VMware (Workstation, ESXi, Fusion) Hyper V Qemu
10 10 VMware well known methods Look at VMware services; ^Vmware\s.* Look at VMware tools: vmware services.exe, vmware tray.exe, etc Look at VMware files. Look at VMware footprint in registry
11 11 Registry surface is HUGE VMware with tools $ strings -el Reg_withtool.reg grep -i vmware wc -l 545 VMware without tools $ strings -el Reg_notool.reg grep -i vmware wc -l 128
12 12 and this is used! Services\Disk\Enum is a quick win.
13 13 Mac address artefact 00:05:69:xx:xx:xx VMware! 00:0C:29:xx:xx:xx VMware! 00:1C:14:xx:xx:xx VMware! 00:50:56:xx:xx:xx VMware! 00:15:5D:xx:xx:xx Hyper V! 00:16:3e:xx:xx:xx Xen
14 14 Techniques in the wild Detecting the virtualization Software companions. Virtualization footprint. Virtualized hardware (Device, Bios). Serial numbers (Disks, Windows) 0CD1A40h & h
15 15 Technique in the wild 64 Bits software Detecting the sandboxes Browser History, Running apps AD Domain membership User interaction (typing, mouse moves)
16 16 Nice But triggered
17 17 Well known myths Personally never seen but a friend of a friend who has seen a friend!! mov eax, 'VMXh';! mov ecx, 10; // "CODE" to get the VMware Version! mov edx, 'VX'; // Port Number! in eax, dx; // Read port, On return EAX returns the VERSION! cmp ebx, 'VMXh'; // is it VMware! isolation.tools.getptrlocation.disable = "TRUE" isolation.tools.setptrlocation.disable = "TRUE" isolation.tools.setversion.disable = "TRUE" isolation.tools.getversion.disable = "TRUE"
18 18 Historical Legends Undocumented instructions (a long time ago) AAM in Qemu (2007) SETALC/SALC VM Behaviour Red Pill (sidt or sldt,sgdt ) (2008)!
19 19 KISS How many brains in the box? There has been more than «1» for over 15 years now! Hyperthreading Multi core CPU s
20 20 KISS ask PEB Process Environnement Block Process memory ENV PROG DLL DLL PEB Kernel Always located at FS:0x30/GS:0x64 Or in EBX on program start
21 21 KISS ask unsigned long! mov eax,0x30; mov ebx, [fs:eax] fs:0x30 mov eax, [ebx+0x64] ;
22 22 Virtualisation detection Let s play with the x86 opcode CPUID Non-privileged instruction. API to query CPU features Calls are hooked by Ring 0 Simply fill eax and it will meet your needs
23 23 Virtualisation detection Leak s INTEL VT/AMD-V mother or child status $ cat /proc/cpuinfo processor : 0 vendor_id : AuthenticAMD cpu family : 16 model : 4 model name : AMD Phenom(tm) II X4 945 Processor stepping : 2 cpu MHz : cache size : 512 KB fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 5 wp : yes flags : fpu de tsc msr pae cx8 cmov pat clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_opt 3dnowext 3dnow pni popcnt hypervisor cmp_leg acy extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch bogomips : clflush size : 64 cache_alignment : 64 address sizes : 48 bits physical, 48 bits virtual power management: ts ttp tm stc 100mhzsteps hwpstate
24 24 Virtualisation detection Leak s INTEL VT mother or child status CPUID Leaf 1, tell if hypervised with the last ECX bit
25 25 Virtualisation detection Leak s hypervisor brand CPUID Leaf 0x , return the virtualisation vendor string in EBX, ECX,EDX Microsoft: Microsoft HV VMware : VMwareVMware Kvm: KVMKVMKVMKVM Xen/ProxMox: XenVMMXenVMM
26 26 Virtualisation detection CPUID weirdness Native Windows Vmware
27 27 Virtualisation detection CPUID weirdness Native Windows Virtual Box
28 28 Virtualization detection Leak s CPU Box cores count leaf 4 gives cache status On i3, i5, i7, leaf 0xb gives cpu count Core Core Core Core X2 for hyperthread Core Core Core Core Windows see 16 CPUs!
29 29 Virtualization detection
30 30 Virtualization detection!! Cpuid bible through examples
31 31 Virtualization detection CPUID Missuse.!! 0x returns the last supported leaf in EAX Since P4 (2003) at least 0x
32 32 Virtualization detection! EAX In EAX EBX ECX EDX ! E C D6F D 4E205550! E31 7A A B C D
33 33 Virtualization detection! Intel(R) Atom(TM) CPU 1.66GHz ! Intel(R) Atom(TM) CPU 1.60GHz ! Intel(R) Xeon(R) CPU 2.00GHz ! Intel(R) Xeon(R) CPU 3.10GHz ! Intel(R) Core(TM) i3-3217u 1.80GHz
34 34 Virtualization detection EAX In EAX EBX ECX EDX! ! 746E C D6F D 4E ! E31 7A A B C D
35 35 Virtualization detection EAX In EAX EBX ECX EDX! ! 746E C D6F D 4E ! E31 7A A B C D
36 36 Virtualization detection!!!
37 37 Sandbox detection
38 38 Using the LDR structure InLoadOrderModuleList PEB LDR InMemoryOrderModuleList InInitialisationOrderModuleList Executable name Loaded dll names
39 39 Using the LDR structure InLoadOrderModuleList PEB LDR InMemoryOrderModuleList InInitialisationOrderModuleList! dbghelp.dll sbiedll.dll It s true! using Sandboxie avoid malwares to be launched!
40 40 Using the LDR structure Process memory ENV PROG DLL! kernel32 DLL! ntdll DLL! msvcrt DLL! ws_32 PEB Kernel Sandbox logging
41 41 Using the LDR structure InMemoryOrderModuleList enumdll.exe! KERNEL32.dll! ntdll.dll! msvcrt.dll simple executable : $ objdump -x enumdll.exe DLL Name: KERNEL32.dll DLL Name: msvcrt.dll InMemoryOrderModuleList enumdll.exe! KERNEL32.dll! ntdll.dll! msvcrt.dll! SHLWAPI.DLL! ADVAPI32.dll! RPCRT4.dll! Secur32.dll! GDI32.dll! USER32.dll! WS2_32.dll! WS2HELP.dll! IMM32.DLL! mswsock.dll!
42 42 Using the LDR structure
43 43 Process memory Find the Jump ENV PROG DLL! kernel32 DLL! ntdll DLL! msvcrt DLL! ws_32 PEB Kernel 8BFF! 55! 8BEC Sleep:! mov edi, edi! push ebp! mov ebp, esp!! enum {! HOOK_JMP_DIRECT,! HOOK_NOP_JMP_DIRECT,! HOOK_HOTPATCH_JMP_DIRECT,! HOOK_PUSH_RETN,! HOOK_NOP_PUSH_RETN,! HOOK_JMP_INDIRECT,! HOOK_MOV_EAX_JMP_EAX,! HOOK_MOV_EAX_PUSH_RETN,! HOOK_MOV_EAX_INDIRECT_JMP_EAX,! HOOK_MOV_EAX_INDIRECT_PUSH_RETN,! #if HOOK_ENABLE_FPU! HOOK_PUSH_FPU_RETN,! #endif! HOOK_SPECIAL_JMP,! HOOK_TECHNIQUE_MAXTYPE,! };!
44 44 Find the Jump kernel32.writeprocessmemory(hprocess,baseaddress,buffer,size,pbyteswritten)!! CPU Disasm! Address Hex dump! Command Comments! 7C !! NOP! 7C !! NOP! 7C BFF!! MOV EDI,EDI ; BOOL! 7C !! PUSH EBP! 7C BEC!! MOV EBP,ESP! 7C !! PUSH ECX! 7C !! PUSH ECX! 7C80221A 8B45 0C!! MOV EAX,DWORD PTR SS:[EBP+0C]! 7C80221D 53!! PUSH EBX! 7C80221E 8B5D 14!! MOV EBX,DWORD PTR SS:[EBP+14]! 7C !! PUSH ESI! 7C B35 C412807C! MOV ESI,DWORD PTR DS:[<&ntdll.NtProtectV
45 45 Find the Jump kernel32.writeprocessmemory(hprocess,baseaddress,buffer,size,pbyteswritten)!! CPU Disasm! Address Hex dump! Command Comments! 7C !! NOP! 7C !! NOP! 7C E9 6076EDE8! JMP 656D9878 ; BOOL! 7C !! PUSH ECX! 7C !! PUSH ECX! 7C80221A 8B45 0C!! MOV EAX,DWORD PTR SS:[EBP+0C]! 7C80221D 53!! PUSH EBX! 7C80221E 8B5D 14!! MOV EBX,DWORD PTR SS:[EBP+14]! 7C !! PUSH ESI! 7C B35 C412807C! MOV ESI,DWORD PTR DS:[<&ntdll.NtProtectV!
46 46 Find the Jump! invoke _getdll,hash_kernel32.dll invoke _getfunction, eax, HASH_WRITEPROCESSMEMORY cmp dword [eax],0x8b55ff8b je.nohsandbox ret.nohsandbox:!
47 47 Jump like Bubka Kernel Ntdll.dll Sysenter Call NTDelayExecution() Kernel32.dll Call Sleepex() Call Sleep() Prog IAT
48 48 Jump like Bubka Kernel Ntdll.dll Kernel32.dll Jump Where? Prog Sysenter
49 49 Jump like Bubka Kernel version is found also in PEB Kocham cię J00ru! Not during CTF
50 50 Jump like Bubka Kernel Side hooking Kernel Ntdll.dll Kernel32.dll Prog Sysenter()
51 51 Reload the DLL Kernel Side hooking Kernel Ntdll.dll Ntdll.dll Kernel32.dll Kernel32.dll Prog Sysenter Call NTDelayExecution() Call Sleepex() Call Sleep() Use a custom! «LoadLibrary»!! Thank s to POC!! Github: Fancycode/MemoryModule
52 52 Playing for time Every sandbox has a time limit Common time function are hooked
53 53 Playing for time Looking time on the web. Use unwatched gettickcount Process something.
54 54 Playing for time! Use a rdtsc loop. At max, It could wait up to 18,446,744,073,709,551,615 clock cycle
55 55 Playing for time rdtsc mov ecx,eax.timing1: push ecx cpuid // Something todo rdtsc pop ecx cmp eax,ecx jae.timing1.timing2: push ecx cpuid rdtsc pop ecx cmp eax,ecx jb.timing2
56 56 Playing for time Fooling the Sec Guy Thread 1 : Sleep(60000) Thread 2: work then ResolveHost
57 57 Playing for time Fooling the Sec Guy Thread 1 : Sleep(60000) Thread 2: ResolveHost
58 58 Playing for time Fooling the Sec Guy Thread 1 : Sleep(60000) Thread 2: ResolveHost
59 59 The FireEye deception Simple POC main { UrlDownloadtoFile (stage2.xml?hash(hostname)) If success { Decipher(stage 2) Put in hklm/user/run } }
60 60 Virtualization/Cpu Trend Deep Sec Fireeye Cuckoo (Malwr) ThreatExpert Comodo Joe Sandbox Anubis
61 61 Sandbox Detection Trend Deep Sec Fireeye Cuckoo (Malwr) ThreatExpert Comodo Xandora Joe Sandbox Anubis
62 62 Mitigate at Work Avoid download of any Executable! For exploits; Consider adding host solutions (EMET) vs SANDBOX magic.!
63 63 Mitigate Many CPUs CPUID tuning Vmware : cpuid.1.ecx = " Kvm : cpu: host,-hypervisor
64 64 Mitigate Many CPUs, CPUID tuning No Virtualisation tools!, Leverage footprint Dump a real used workstation Use virtualisation everywhere! Use multiple sandboxes
65 65 Mitigate Very Good hardening guide by EP_XOFF Automated tool for Cuckoo by Jbremer My test suite
66 66 Conclusion Sandbox as a magic device is like trusting AV as a magic device. Detection is definitively easier than bypass. Host based sandbox seems like a more interesting approach.
67 67 Any Questions?? Thanks Welcome Back malwr.com! radare2 make also great screenshots Thank s fly to #malware.lu #root-me and all other friends for ideas and test support.
Virtualization on Linux Using KVM and libvirt. Matt Surico Long Island Linux Users Group 11 March, 2014
Virtualization on Linux Using KVM and libvirt Matt Surico Long Island Linux Users Group 11 March, 2014 What will we talk about? Rationalizing virtualization Virtualization basics How does it work under
TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com
TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and
Performance monitoring. in the GNU/Linux environment. Linux is like a wigwam - no Windows, no Gates, Apache inside!
1 Performance monitoring in the GNU/Linux environment Linux is like a wigwam - no Windows, no Gates, Apache inside! 2 1 Post-conditions To be familiar with some performance-tuning options To be able to
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
ovirt QoS Martin Sivák Red Hat Czech KVM Forum October 2013 ovirt QOS
ovirt QoS Martin Sivák Red Hat Czech KVM Forum October 2013 1 Agenda Why is QoS important? Scalability and management challenges Managing resources CPU Network Memory Future plans 2 How do we define QoS?
1. General function and functionality of the malware
1. General function and functionality of the malware The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access
VMDE Virtual Machines Detection Enhanced
VMDE Virtual Machines Detection Enhanced N. Rin EP_X0FF November 2013 Abstract This document contains short overview of existing and exploited by WinNT malicious software (malware) methods (AntiVM) that
Performance monitoring with Intel Architecture
Performance monitoring with Intel Architecture CSCE 351: Operating System Kernels Lecture 5.2 Why performance monitoring? Fine-tune software Book-keeping Locating bottlenecks Explore potential problems
Virtualization Technologies
12 January 2010 Virtualization Technologies Alex Landau ([email protected]) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
Detecting the One Percent: Advanced Targeted Malware Detection
Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Title: Bugger The Debugger - Pre Interaction Debugger Code Execution
White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers
Heap-based Buffer Overflow Vulnerability in Adobe Flash Player
Analysis of Zero-Day Exploit_Issue 03 Heap-based Buffer Overflow Vulnerability in Adobe Flash Player CVE-2014-0556 20 December 2014 Table of Content Overview... 3 1. CVE-2014-0556 Vulnerability... 3 2.
Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail All materials is licensed under a Creative Commons Share Alike license http://creativecommonsorg/licenses/by-sa/30/ # whoami Ali
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
CPU performance monitoring using the Time-Stamp Counter register
CPU performance monitoring using the Time-Stamp Counter register This laboratory work introduces basic information on the Time-Stamp Counter CPU register, which is used for performance monitoring. The
Mission 1: The Bot Hunter
Mission 1: The Bot Hunter Mission: Interpol have asked the BSidesLondon Unhackable Mission Force to penetrate and shut down a notorious botnet. Our only clue is a recovered bot executable which we hope
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Virtualisa)on* and SAN Basics for DBAs. *See, I used the S instead of the zed. I m pretty smart for a foreigner.
Virtualisa)on* and SAN Basics for DBAs *See, I used the S instead of the zed. I m pretty smart for a foreigner. Brent Ozar - @BrentO BrentOzar.com/go/san BrentOzar.com/go/virtual Today s Agenda! How Virtualisa7on
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Attacking x86 Windows Binaries by Jump Oriented Programming
Attacking x86 Windows Binaries by Jump Oriented Programming L. Erdődi * * Faculty of John von Neumann, Óbuda University, Budapest, Hungary [email protected] Abstract Jump oriented programming
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Learn from malware! A practical guide of spear phishing for red teams. Paul Jung
Learn from malware! A practical guide of spear phishing for red teams Paul Jung WARNING Legal disclaimer 2 All the tricks and tips showed here are used in real life No malware were harmed during the preparation
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
The Plan Today... System Calls and API's Basics of OS design Virtual Machines
System Calls + The Plan Today... System Calls and API's Basics of OS design Virtual Machines System Calls System programs interact with the OS (and ultimately hardware) through system calls. Called when
REpsych. : psycholigical warfare in reverse engineering. def con 2015 // domas
REpsych : psycholigical warfare in reverse engineering { def con 2015 // domas Warning This serves no purpose Taking something apart to figure out how it works With software Interfacing Documentation Obsolescence
Basics of Virtualisation
Basics of Virtualisation Volker Büge Institut für Experimentelle Kernphysik Universität Karlsruhe Die Kooperation von The x86 Architecture Why do we need virtualisation? x86 based operating systems are
Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
On the Cutting Edge: Thwarting Virtual Machine Detection
On the Cutting Edge: Thwarting Virtual Machine Detection Tom Liston, Senior Security Consultant Intelguardians Handler SANS Internet Storm Center [email protected] Ed Skoudis, Founder / Senior Security
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
Software Vulnerabilities
Software Vulnerabilities -- stack overflow Code based security Code based security discusses typical vulnerabilities made by programmers that can be exploited by miscreants Implementing safe software in
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer [email protected] Agenda Session Length:
RUNNING vtvax FOR WINDOWS
RUNNING vtvax FOR WINDOWS IN A AVT / Vere Technologies TECHNICAL NOTE AVT/Vere Technical Note: Running vtvax for Windows in a Virtual Machine Environment Document Revision 1.1 (September, 2015) 2015 Vere
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Detecting the Presence of Virtual Machines Using the Local Data Table
Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/
Betriebssysteme KU Security
Betriebssysteme KU Security IAIK Graz University of Technology 1 1. Drivers 2. Security - The simple stuff 3. Code injection attacks 4. Side-channel attacks 2 1. Drivers 2. Security - The simple stuff
Attacks on Virtual Machine Emulators
SYMANTEC ADVANCED THREAT RESEARCH 1 Attacks on Virtual Machine Emulators Peter Ferrie, Senior Principal Researcher, Symantec Advanced Threat Research [email protected] Abstract As virtual machine
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
INTRODUCTION TO MALWARE & MALWARE ANALYSIS
INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified INTRODUCTION Very often people call everything that corrupts their system a virus without being aware about what it
Cloud Security Is Not (Just) Virtualization Security
Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni IBM Research Cloud Security Is Not (Just) Virtualization Security Virtualization Enables Many Security Applications
OS Virtualization Frank Hofmann
OS Virtualization Frank Hofmann OP/N1 Released Products Engineering Sun Microsystems UK Overview Different approaches to virtualization > Compartmentalization > System Personalities > Virtual Machines
KVM as a Microsoft-compatible hypervisor.
KVM as a Microsoft-compatible hypervisor. Vadim Rozenfeld KVM Forum, 2012 1 Agenda Microsoft Enlightenment KVM as a conformant hypervisor Performance Improvments 2 Microsoft Enlightenment
Attacking Host Intrusion Prevention Systems. Eugene Tsyrklevich [email protected]
Attacking Host Intrusion Prevention Systems Eugene Tsyrklevich [email protected] Agenda Introduction to HIPS Buffer Overflow Protection Operating System Protection Conclusions Demonstration
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
RED HAT ENTERPRISE VIRTUALIZATION
Giuseppe Paterno' Solution Architect Jan 2010 Red Hat Milestones October 1994 Red Hat Linux June 2004 Red Hat Global File System August 2005 Red Hat Certificate System & Dir. Server April 2006 JBoss April
RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING
RED HAT ENTERPRISE VIRTUALIZATION & CLOUD COMPUTING James Rankin Senior Solutions Architect Red Hat, Inc. 1 KVM BACKGROUND Project started in October 2006 by Qumranet - Submitted to Kernel maintainers
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
Disassembly of False Positives for Microsoft Word under SCRAP
Disassembly of False Positives for Microsoft Word under SCRAP We evaluated Word application of Microsoft Office 2010 Suite using a 54 KiB document [1] under the SCRAP configuration S 7,4 for one billion
Violating Database - Enforced Security Mechanisms
Violating Database - Enforced Security Mechanisms Runtime Patching Exploits in SQL Server 2000: a case study Chris Anley [[email protected]] 18/06/2002 An NGSSoftware Insight Security Research (NISR)
Virtualization. Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/
Virtualization Jia Rao Assistant Professor in CS http://cs.uccs.edu/~jrao/ What is Virtualization? Virtualization is the simulation of the software and/ or hardware upon which other software runs. This
DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS
DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS Step-by-Step Abstract The Enrollment for Education Solutions agreement between Microsoft and Duval County Public Schools provides a student option
The Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
SCO Virtualization Presentation to Customers
SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization
Hypervisor-Based, Hardware-Assisted System Monitoring
Horst Görtz Institute for IT-Security, Chair for System Security VMRay GmbH Hypervisor-Based, Hardware-Assisted System Monitoring VB2013 October 2-4, 2013 Berlin Carsten Willems, Ralf Hund, Thorsten Holz
Introduction to Reverse Engineering
Introduction to Reverse Engineering Inbar Raz Malware Research Lab Manager December 2011 What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles of a
Andreas Herrmann. AMD Operating System Research Center
Myth and facts about 64-bit Linux Andreas Herrmann André Przywara AMD Operating System Research Center March 2nd, 2008 Myths... You don't need 64-bit software with less than 3 GB RAM. There are less drivers
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
64-Bit NASM Notes. Invoking 64-Bit NASM
64-Bit NASM Notes The transition from 32- to 64-bit architectures is no joke, as anyone who has wrestled with 32/64 bit incompatibilities will attest We note here some key differences between 32- and 64-bit
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE
MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization
Vocera Voice 4.3 and 4.4 Server Sizing Matrix
Vocera Voice 4.3 and 4.4 Server Sizing Matrix Vocera Server Recommended Configuration Guidelines Maximum Simultaneous Users 450 5,000 Sites Single Site or Multiple Sites Requires Multiple Sites Entities
The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation Techniques To appear at USENIX Security & BlackHat USA, 2014
Intelligent Things, Vehicles and Factories: Intel Workshop on Cyberphysical and Mobile Security 2014, Darmstadt, June 11 The Beast is Resting in Your Memory On Return-Oriented Programming Attacks and Mitigation
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
CS412/CS413. Introduction to Compilers Tim Teitelbaum. Lecture 20: Stack Frames 7 March 08
CS412/CS413 Introduction to Compilers Tim Teitelbaum Lecture 20: Stack Frames 7 March 08 CS 412/413 Spring 2008 Introduction to Compilers 1 Where We Are Source code if (b == 0) a = b; Low-level IR code
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
WLSI Windows Local Shellcode Injection. Cesar Cerrudo Argeniss (www.argeniss.com)
WLSI Windows Local Shellcode Injection Cesar Cerrudo Argeniss (www.argeniss.com) Overview _ Introduction _ Establishing a LPC connection _ Creating a shared section _ The technique _ Building an exploit
Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010
Do you? or Inside a killer IMBot Wei Ming Khoo University of Cambridge 19 Nov 2010 Background Tracking a botnet propagating over Skype & Yahoo IM. Bait is Foto Exploits social connectivity (friend
Fighting malware on your own
Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared
Software Fingerprinting for Automated Malicious Code Analysis
Software Fingerprinting for Automated Malicious Code Analysis Philippe Charland Mission Critical Cyber Security Section October 25, 2012 Terms of Release: This document is approved for release to Defence
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
For a 64-bit system. I - Presentation Of The Shellcode
#How To Create Your Own Shellcode On Arch Linux? #Author : N3td3v!l #Contact-mail : [email protected] #Website : Nopotm.ir #Spcial tnx to : C0nn3ct0r And All Honest Hackerz and Security Managers I - Presentation
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Scaling in a Hypervisor Environment
Scaling in a Hypervisor Environment Richard McDougall Chief Performance Architect VMware VMware ESX Hypervisor Architecture Guest Monitor Guest TCP/IP Monitor (BT, HW, PV) File System CPU is controlled
MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT
MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT Frequently Asked Questions Abstract This Enrollment provides Duval County Public Schools a license for certain specified Microsoft Products
Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
Virtualization Detection: New Strategies and Their Effectiveness
Virtualization Detection: New Strategies and Their Effectiveness Christopher Thompson [email protected] Maria Huntley [email protected] Chad Link [email protected] ABSTRACT Previous methods for detecting
Next Generation Firewalls and Sandboxing
Next Generation Firewalls and Sandboxing Joe Hughes, Director www.servicetech.co.uk Summary What is a Next Generation Firewall (NGFW)? Threat evolution Features Deployment Best practices What is Sandboxing?
Bypassing Anti- Virus Scanners
Bypassing Anti- Virus Scanners Abstract Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants.
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
Reverse Engineering Malware Part 1
Reverse Engineering Malware Part 1 Author :Arunpreet Singh Blog : https://reverse2learn.wordpress.com MD5 Hash : 1d8ea40a41988b9c3db9eff5fce3abe5 This is First Part of 2 Part Series.This Malware Drops
AMD Processor Recognition Application Note. For Processors Prior to AMD Family 0Fh Processors
AMD Processor Recognition Application Note For Processors Prior to Publication # 20734 Revision: 3.13 Issue Date: December 2005 1997 2004 Advanced Micro Devices, Inc. All rights reserved. The contents
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
USENIX Security Symposium 2014, San Diego, CA, USA Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Lucas Davi Intel Collaborative Research Institute for
Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC
Paper 347-2009 Virtualization: What does it mean for SAS? Karl Fisher and Clarke Thacher, SAS Institute Inc., Cary, NC ABSTRACT SAS groups virtualization into four categories: Hardware Virtualization,
An Implementation Of Multiprocessor Linux
An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than
Removing Sentinel SuperPro dongle from Applications and details on dongle way of cracking Shub-Nigurrath of ARTeam Version 1.
Removing Sentinel SuperPro dongle from Applications Shub-Nigurrath of ARTeam Version 1.0 September 2006 1. Abstract... 2 2. Possible approaches: emulations vs simulation... 3 2.1. How a dongle works...
Intel Virtualization Technology FlexMigration Application Note
Intel Virtualization Technology FlexMigration Application Note This document is intended only for VMM or hypervisor software developers and not for application developers or end-customers. Readers are
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
