VICE Catch the hookers! (Plus new rootkit techniques) Jamie Butler Greg Hoglund
|
|
|
- Doris Curtis
- 10 years ago
- Views:
Transcription
1 VICE Catch the hookers! (Plus new rootkit techniques) Jamie Butler Greg Hoglund
2 Agenda Introduction to Rootkits Where to Hook VICE detection Direct Kernel Object Manipulation (DKOM) No hooking required! Demonstration of FU rootkit
3 Operating System Design User Land Operating system provides common API for developers to use Kernel32.dll Ntdll.dll Kernel Mode The low level kernel functions that implement the services needed in user land Protected memory containing objects such as those for processes, tokens, ports, etc.
4 Attack Scenario Attacker gains elevated access to computer system Attacker installs a Rootkit Rootkit s functions Hide processes Hide files Hide network connections Install a backdoor for future access to the system Rootkits act as a part of the operating system so they have access to kernel functions.
5 State of Current Rootkits Until recently, rootkits were nothing more than Trojan programs such as ps, ls, top, du, and netstat Advanced rootkits filter data Hook the Import Address Table (IAT) in processes Hook the System Call Table of the operating system (the functions exported by the kernel) Hook the Interrupt Descriptor Table (IDT) Interrupts are used to signal to the kernel that it has work to perform. By hooking one interrupt, a clever rootkit can filter all exported kernel functions.
6 IAT Hooks Import Address Table FunctionName or Ordinal 0x Table Entry
7 IAT Hooks CODE Some DLL FunctionName or Ordinal 0x CODE Table Entry
8 IAT Hooks CODE Some DLL BAD CODE CODE Some Rootkit
9 IAT Hooks CODE Some DLL BAD CODE CODE Some Rootkit
10 System Call KiSystemService Call Number 0x System Service Descriptor Table Table Entry USER MODE KERNEL MODE
11 System Call Kernel or module Call Number 0x System Service Descriptor Table Table Entry USER MODE KERNEL MODE
12 System Call Kernel or module Some rootkit System Service Descriptor Table USER MODE KERNEL MODE
13 System Call Kernel or module Some rootkit System Service Descriptor Table USER MODE KERNEL MODE
14 System Call Kernel or module Some rootkit USER MODE KERNEL MODE
15 Control Flow aka Places to Kernel32 CreateFileW Hook NTDLL NtCreateFile User Land Kernel
16 Control Flow aka Places to IDT 2E Hook System Call Table &NtCreateFile NtCreateFile { push ebp mov ebp, esp xor eax, eax push eax } User Land Kernel
17 VICE VICE is a tool to detect rootkits Designed originally to detect hooks Kernel System Call Hooks Win32 API Hooks In-line function patching VICE has an API so other it can be easily incorporated into other tools
18 VICE Demonstrations
19 VICE vs hxdef rootkit
20 VICE vs Vanquish rootkit
21 Consumers demand more Corporations and many private consumers see the need for more security Personal firewalls Host based intrusion prevention systems
22 Current HIDS/HIPS Functions To detect or prevent: Processes running Files that are created/deleted/modified Network connections made Privilege escalation Trusts the operating system to report these activities. If the underlying operating system is compromised, the HIDS/HIPS fails.
23 What Makes HIDS/HIPS Possible? Querying kernel reporting functions Hooking user land API functions Kernel32.dll Ntdll.dll Hooking the System Call Table Registering OS provided call-back functions
24 Problems with HIPS Design Required to be on the execution path of the attacker to allow/deny actions Looks just like the hooks rootkits use (dual technology) who said an attacker has to use an API
25 Operating System Design Intel has four privilege levels or rings Microsoft and many other OS vendors use only two rings
26 Operating System Design By only using two privilege levels, there is no separation between the kernel itself and third party drivers or loadable kernel modules (LKM s) Drivers can modify the memory associated with kernel objects such as those that represent a process s token
27 Next Generation Rootkit Techniques Direct Kernel Object Manipulation (DKOM) in memory A device driver or loadable kernel module has access to kernel memory A sophisticated rootkit can modify the objects directly in memory in a relatively reliable fashion to hide. Recall the goal of rootkits is to hide things: processes, files, and network connections.
28 DKOM Uses Hide Processes Add Privileges to Tokens Add Groups to Tokens Manipulate the Token to Fool the Windows Event Viewer Hide Ports
29 The Implication of Hidden Processes The intruder has full control of the system. Defeats a Host Based IDS/IPS that depends upon the underlying operating system. Will skew the results of forensic examinations.
30 Hiding Processes - Windows KPRCB *CurrentThread *NextThread *IdleThread ETHREAD KTHREAD ApcState EPROCESS KPROCESS EPROCESS KPROCESS EPROCESS KPROCESS LIST_ENTRY { FLINK BLINK } LIST_ENTRY { FLINK BLINK } LIST_ENTRY { FLINK BLINK }
31 Hiding Processes - Windows Locate the Processor Control Block (KPRCB) Located at 0xffdff120 fs register in kernel mode points to 0xffdff000 Within the KPRCB is a pointer to the Current Thread block (ETHREAD) Located at fs:[124] or 0xffdff124 An ETHREAD contains a KTHREAD structure
32 Hiding Processes - Windows The KTHREAD structure contains a pointer to the EPROCESS block of the current process The EPROCESS block contains a LIST structure, which has a forward and backward pointer to active processes This creates the doubly linked list of active processes in Windows
33 Hiding Processes - Windows To hide a process Locate the EPROCESS block of the process to hide Change the process behind it to point to the process after the process you are hiding Change the process after it to point to the process before the one you are trying to hide Essentially, the list of active now processes points around the hidden process
34 Hiding Processes - Windows KPRCB *CurrentThread *NextThread *IdleThread ETHREAD KTHREAD ApcState EPROCESS KPROCESS EPROCESS KPROCESS EPROCESS KPROCESS LIST_ENTRY { FLINK BLINK } LIST_ENTRY { FLINK BLINK } LIST_ENTRY { FLINK BLINK }
35 Hiding Processes - Windows Why does the process continue to run? Scheduling in the Windows kernel is thread based and not process based. Although scheduling code to run is based upon threads, when the kernel reports what is running on the system, it reports based upon EPROCESS blocks which can be modified with no adverse affect. This is what current tools (IDS/IPS s) rely upon to discover what is running on the system.
36 Hiding Processes LINUX The LINUX kernel contains an array of task_struct s. A task_struct is similar to an EPROCESS block in Windows task_struct contains pointers to the prev_task and next_task task_struct also contains pointers to the prev_run and next_run for the running processes
37 Hiding Processes LINUX To hide a process, remove the process from the list of prev_task and next_task Leave next_run and prev_run alone
38 Hiding Processes - LINUX task_array PID Process 0 State *next_task *prev_task *next_run *prev_run *p_pptr (null) *p_cptr *p_ysptr *p_osptr PID State *next_task *prev_task *next_run *prev_run *p_pptr *p_cptr *p_ysptr *p_osptr PID State *next_task *prev_task *next_run *prev_run *p_pptr *p_cptr *p_ysptr *p_osptr PID 1901 State *next_task *prev_task *next_run *prev_run *p_pptr *p_cptr *p_ysptr *p_osptr......
39 Hiding Processes LINUX task_array PID 1901 State *next_task *prev_task *next_run *prev_run PID Process 0 State *next_task *prev_task *next_run *prev_run PID State *next_task *prev_task *next_run *prev_run *p_pptr *p_cptr *p_ysptr *p_osptr *p_pptr *p_cptr *p_ysptr *p_osptr *p_pptr *p_cptr *p_ysptr *p_osptr
40 Hiding Processes - LINUX To prevent the process from freezing The LINUX scheduler walks the list of task_struct s to calculate the goodness value of the process to decide rather to schedule it or not. The LINUX scheduler must be modified to allocate time quantums to the parent of process of PID 0
41 Token Manipulation Add Privileges to Token Add Groups to Token Make the Owner of the Token Any User Make Any Actions Taken by the Process Appear to be Someone else such as System Makes forensics difficult Totally fakes out the Windows Event Viewer
42 Static Part TOKEN SOURCE TokenId AuthenticationId ParentTokenId ExpirationTime TokenLock ModifiedId SessionId UserAndGroupCount RestrictedSidCount PrivilegeCount VariableLength Tokens
43 Variable Part Privileges LUID Attribute User and Groups Pointer to SID Attribute Restricted SID s Pointer to SID Attribute Tokens
44 Manipulating Tokens Difficult to just grow the token because you are not sure what is after the variable part in memory Although static portion has pointers to the privileges and groups, just changing these to point to newly allocated memory does not work due to crazy math in a SepDuplicateToken() function
45 Manipulating Tokens There are a lot of Privileges in a token that are disabled We can discard these since they are disabled anyway and free up space for new privileges and groups The in-line method
46 Adding Privileges to Tokens with DKOM Typedef struct _LUID_AND_ATTRIBUTES{ } DWORD Luid; DWORD Attributes;
47 Adding Privileges to Tokens with DKOM Static Portion LUID 0x x LUID 0x x LUID 0x LUID 0x Disabled Priv s Enabled Priv s Added Priv s SID s Restricted SID s
48 Adding Groups to Tokens with DKOM Typedef struct _SID_AND_ATTRIBUTES } { DWORD psid; DWORD Attributes;
49 Adding Groups to Tokens with DKOM Disabled Priv s Enabled Priv s Added SID s Static Portion LUID 0x x LUID 0x x LUID psid 0x x LUID psid 0x x SID SID s SID Restricted SID s
50 Faking Out the Windows Event Viewer using DKOM Change one DWORD in Static Portion of Token SYSTEM_LUID = 0x000003E7 Make FIRST SID in Token the System SID All logging of the Process now appears as System Useful if Detailed Process Tracking is Enabled
51 Detecting Hidden Processes in Windows Methodology: Examine each thread to ensure its corresponding process descriptor (EPROCESS) is appropriately linked. This requires patching the kernel in memory, in particular the SwapContext function. Hunt and Brubacher introduced Detours for intercepting Win32 binary functions.
52 Detours Overwrite beginning of target function (SwapContext) with an unconditional jump to a Detour function Detour function eventually calls a Trampoline function The Trampoline function contains the overwritten bytes of the target (SwapContext) function and calls the target (SwapContext) function The Target function returns to the Detour function The Detour function returns to the source caller (kernel dispatcher)
53 Detours Source Function Detour Function Trampoline Function Target Function 5 4
54 Patching the Windows kernel SwapContext function does context switching between threads in Windows Overwrite the first seven bytes of SwapContext with a jump to our Detour function The EDI register points to the KTHREAD of the thread to be scheduled to run Our Detour function follows the KTHREAD to the EPROCESS block and determines if it is still appropriately linked in the list of active processes.
55 Other Ways to Detect Hidden Processes Klister by Joanna Rutkowska Presented at Black Hat Las Vegas 2003 Looks at Thread Queues since threads must be in one of four queues to be scheduled Problem: Queue addresses are not exported so the addresses must be hard coded for each version of the OS
56 Detecting Hidden Processes in LINUX Injectso is a library similar to Detours except for LINUX When process state is Task_Running and it is placed in the LINUX run queue by setting the prev_run and next_run pointers appropriately, make sure it is properly linked by testing the next_task and prev_task of its neighbors.
57 Tool Demonstration: Process Hiding
58 Tool Demonstration: Gaining System Privilege
59 Conclusion We have shown the evolution of rootkit technology and detection No longer trojanized programs No longer just hooking, which VICE detects Now act as a part of the Trusted Computing Base (TCB) DKOM what will it be used for next?
60 Questions?
61 Thank you. Attend the Black Hat Training Aspects of Offensive Root-kit Technology
Inside Windows Rootkits
Chris Ries Security Research Engineer VigilantMinds Inc. 4736 Penn Avenue Pittsburgh, PA 15224 [email protected] Introduction Although they have been around for quite some time, rootkits have become
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Attacking Host Intrusion Prevention Systems. Eugene Tsyrklevich [email protected]
Attacking Host Intrusion Prevention Systems Eugene Tsyrklevich [email protected] Agenda Introduction to HIPS Buffer Overflow Protection Operating System Protection Conclusions Demonstration
Introduction. Current personal firewalls are focused on combating usermode malware. Overview. What about protection against rootkits?
Introduction Current personal firewalls are focused on combating usermode malware What about protection against rootkits? Overview i386 Windows NT+ network subsystem overview What malware authors usually
Towards Reliable Rootkit Detection in Live Response
Towards Reliable Rootkit Detection in Live Response Felix C. Freiling Laboratory for Dependable Distributed Systems University of Mannheim, Germany Bastian Schwittay Symantec (Deutschland) GmbH, Germany
www.securityxploded.com
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the
Windows Rootkit Overview
WHITE PAPER: SYMANTEC SECURITY RESPONSE Windows Rootkit Overview White Paper: Symantec Security Response Windows Rootkit Overview Contents Introduction...4 User Mode Rootkits...4 Kernel Mode Rootkits...5
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
Physical Memory Forensics. Mariusz Burdach
Physical Memory Forensics Mariusz Burdach Overview Introduction Anti-forensics Acquisition methods Memory analysis of Windows & Linux Recovering memory mapped files Detecting hidden data Verifying integrity
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Detecting the Presence of Virtual Machines Using the Local Data Table
Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/
Peeking into Pandora s Bochs. Instrumenting a Full System Emulator to Analyse Malicious Software
Instrumenting a Full System Emulator to Analyse Malicious Software Lutz Böhne ([email protected]) RedTeam Pentesting GmbH http://www.redteam-pentesting.de April 9th 2010, Paris Hackito
Windows Kernel Internals for Security Researchers
Windows Kernel Internals for Security Researchers Overview This course takes a deep dive into the internals of the Windows kernel from a security perspective. Attendees learn about behind the scenes working
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
The Linux Kernel: Process Management. CS591 (Spring 2001)
The Linux Kernel: Process Management Process Descriptors The kernel maintains info about each process in a process descriptor, of type task_struct. See include/linux/sched.h Each process descriptor contains
Title: Bugger The Debugger - Pre Interaction Debugger Code Execution
White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers
Linux Kernel Rootkit : Virtual Terminal Key Logger
Linux Kernel Rootkit : Virtual Terminal Key Logger Jeena Kleenankandy Roll No. P140066CS Depatment of Computer Science and Engineering National Institute of Technology Calicut jeena [email protected]
Toasterkit - A NetBSD Rootkit. Anthony Martinez Thomas Bowen http://mrtheplague.net/toasterkit/
Toasterkit - A NetBSD Rootkit Anthony Martinez Thomas Bowen http://mrtheplague.net/toasterkit/ Toasterkit - A NetBSD Rootkit 1. Who we are 2. What is NetBSD? Why NetBSD? 3. Rootkits on NetBSD 4. Architectural
Run-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
SQL SERVER Anti-Forensics. Cesar Cerrudo
SQL SERVER Anti-Forensics Cesar Cerrudo Introduction Sophisticated attacks requires leaving as few evidence as possible Anti-Forensics techniques help to make forensics investigations difficult Anti-Forensics
Process Description and Control. 2004-2008 william stallings, maurizio pizzonia - sistemi operativi
Process Description and Control 1 Process A program in execution (running) on a computer The entity that can be assigned to and executed on a processor A unit of activity characterized by a at least one
Peeking into Pandora's Bochs { Instrumenting a Full System Emulator to Analyse Malicious Software
{ Instrumenting a Full System Emulator to Analyse Malicious Software Lutz Bohne ([email protected]) RedTeam Pentesting GmbH http://www.redteam-pentesting.de October, 28th, Luxembourg hack.lu
Traditional Rootkits Lrk4 & KNARK
Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011
MWR InfoSecurity Advisory HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011 Package Name Date 10/11/2011 Affected Versions HTC Windows Phone 7 Phones HTC HD7 confirmed to be vulnerable.
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Lares: An Architecture for Secure Active Monitoring Using Virtualization Bryan D. Payne Martim Carbone Monirul Sharif Wenke Lee School of Computer Science Georgia Institute of Technology Atlanta, Georgia
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11
FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory DFRWS 2006: Work in Progress (WIP) Aug 16, 2006 AAron Walters 4TΦ Research Nick L. Petroni Jr. University
Access token stealing on Windows. Csaba Barta
Access token stealing on Windows Csaba Barta 23. September 2009 Table of Contents Access token stealing on Windows...1 Summary...3 Token manipulation in the past...3 New integrity checking features introduced
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Cloud Security Is Not (Just) Virtualization Security
Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, Diego Zamboni IBM Research Cloud Security Is Not (Just) Virtualization Security Virtualization Enables Many Security Applications
Exploiting Trustzone on Android
1 Introduction Exploiting Trustzone on Android Di Shen(@returnsme) [email protected] This paper tells a real story about exploiting TrustZone step by step. I target an implementation of Trusted Execution
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
Kernel comparison of OpenSolaris, Windows Vista and. Linux 2.6
Kernel comparison of OpenSolaris, Windows Vista and Linux 2.6 The idea of writing this paper is evoked by Max Bruning's view on Solaris, BSD and Linux. The comparison of advantages and disadvantages among
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions Todd Schell [email protected] Director, Product Engineering CoreTrace TM December 2008 Today s Endpoint Control Challenges
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
File-system Intrusion Detection by preserving MAC DTS: A Loadable Kernel Module based approach for LINUX Kernel 2.6.x
File-system Intrusion Detection by preserving MAC DTS: A Loadable Kernel Module based approach for LINUX Kernel 2.6.x Suvrojit Das +91-9734294105 [email protected] Arijit Chattopadhayay +91-9474910685
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
matasano Hardware Virtualization Rootkits Dino A. Dai Zovi
Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda Introductions Virtualization (Software and Hardware) Intel VT-x (aka Vanderpool ) VM Rootkits Implementing a VT-x based Rootkit Detecting Hardware-VM
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Subverting the Xen hypervisor
Subverting the Xen hypervisor Rafał Wojtczuk Invisible Things Lab Black Hat USA 2008, August 7th, Las Vegas, NV Xen 0wning Trilogy Part One Known virtulizationbased rootkits Bluepill and Vitriol They install
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Rootkit: Analysis, Detection and Protection
Rootkit: Analysis, Detection and Protection Igor Neri Sicurezza Informatica Prof. Bistarelli 1/34 Definition of Rootkit A rootkit is malware which consists of a set of programs designed to hide or obscure
Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023
Operating Systems Autumn 2013 Outline 1 2 Types of 2.4, SGG The OS Kernel The kernel is the central component of an OS It has complete control over everything that occurs in the system Kernel overview
One-byte Modification for Breaking Memory Forensic Analysis
One-byte Modification for Breaking Memory Forensic Analysis Takahiro Haruyama / Hiroshi Suzuki Internet Initiative Japan Inc. for submission Summary Memory Forensics Overview Memory Acquisition Memory
CS161: Operating Systems
CS161: Operating Systems Matt Welsh [email protected] Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different
TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com
TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and
Hypervisor-Based, Hardware-Assisted System Monitoring
Horst Görtz Institute for IT-Security, Chair for System Security VMRay GmbH Hypervisor-Based, Hardware-Assisted System Monitoring VB2013 October 2-4, 2013 Berlin Carsten Willems, Ralf Hund, Thorsten Holz
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
MODERN malware use a variety of techniques to cause
72 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014 Data-Centric OS Kernel Malware Characterization Junghwan Rhee, Member, IEEE, Ryan Riley, Member, IEEE, Zhiqiang Lin,
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
W4118 Operating Systems. Junfeng Yang
W4118 Operating Systems Junfeng Yang Outline Linux overview Interrupt in Linux System call in Linux What is Linux A modern, open-source OS, based on UNIX standards 1991, 0.1 MLOC, single developer Linus
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 [email protected]
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement MJ0011 [email protected] Agenda Background A Patched Vulnerability: CVE-2010-4398 Bypass DSE on Windows7 x64 Windows8
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Virtual Machine Security
Virtual Machine Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ 1 Operating System Quandary Q: What is the primary goal
Virtdbg. Using virtualization features for debugging the Windows 7 kernel. Damien Aumaitre. Recon 2011
Virtdbg Using virtualization features for debugging the Windows 7 kernel Damien Aumaitre Recon 2011 D. Aumaitre Virtdbg 2/42 Roadmap How it began Designing a kernel debugger Debugging Windows 7 x64 1 How
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
Bluepilling the Xen Hypervisor
Bluepilling the Xen Hypervisor Joanna Rutkowska & Alexander Tereshkin Invisible Things Lab Black Hat USA 2008, August 7th, Las Vegas, NV Xen 0wning Trilogy Part Three Previously on Xen 0wning Trilogy...
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?
Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey
VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D
ware and CPU Virtualization Technology Jack Lo Sr. Director, R&D This presentation may contain ware confidential information. Copyright 2005 ware, Inc. All rights reserved. All other marks and names mentioned
Operating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first
Operating Systems Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first JavaScript interpreter Web browser menu / icon / dock??? login??? CPU,
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Georgia Institute of Technology Annual Computer Security Applications Conference
Q-CERT Workshop. Matthew Geiger [email protected]. 2007 Carnegie Mellon University
Memory Analysis Q-CERT Workshop Matthew Geiger [email protected] 2007 Carnegie Mellon University Outline Why live system forensics? Previous techniques Drawbacks and new thinking Approaches to memory acquisition
Red Hat Linux Internals
Red Hat Linux Internals Learn how the Linux kernel functions and start developing modules. Red Hat Linux internals teaches you all the fundamental requirements necessary to understand and start developing
Kernel Intrusion Detection System
Kernel Intrusion Detection System Rodrigo Rubira Branco [email protected] [email protected] Monica's Team!! Brazilian famous H.Q. story Amazon Forest Yeah, Brazilian country! Soccer Brazilian
Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs
Host-based Intrusion Prevention on Windows and UNIX Dr. Rich Murphey White Oak Labs Acknowledgements Niels Provos OpenBSD s systrace DT suggested this thread last year Greg Hoglund insights md5 at da ghettohackers
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
OLD WIN32 CODE FOR A MODERN, SUPER-STEALTH TROJAN
OLD WIN32 CODE FOR A MODERN, SUPER-STEALTH TROJAN BLACKHAT EUROPE 2004 Eric DETOISIEN Team Rstack Eyal DOTAN Tegam International Agenda Introduction Communication model Code injection API Hooking Final
Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail All materials is licensed under a Creative Commons Share Alike license http://creativecommonsorg/licenses/by-sa/30/ # whoami Ali
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft nealch@microsoft.
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft [email protected] What is Storage Class Memory? Paradigm Shift: A non-volatile storage
VMDriver: A Driver-based Monitoring Mechanism for Virtualization
VMDriver: A Driver-based Monitoring Mechanism for Virtualization Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao Huazhong University of Science and Technology, Wuhan, 430074, China Samsung
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
Defeating Windows Personal Firewalls: Filtering Methodologies, Attacks, and Defenses
Defeating Windows Personal Firewalls: Filtering Methodologies, Attacks, and Defenses Chris Ries Security Research Analyst VigilantMinds Inc. 4736 Penn Avenue Pittsburgh, PA 15224 [email protected]
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Oracle Database Vault: Design Failures
Oracle Database Vault: Design Failures What is Database Vault? Helps protecting against insider threats even when these comes from privileged database users (SYS) Mandatory in certain countries: laws Can
VBootKit 2.0 - Attacking Windows 7 via Boot Sectors
VBootKit 2.0 - Attacking Windows 7 via Boot Sectors HITB-Dubai 2009 2009-4-23 Nitin Kumar Security Researcher [email protected] Vipin Kumar Security Researcher [email protected] What we do? Analysing malware
ERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Understanding a Simple Operating System
Understanding a Simple Operating System SOS is a Simple Operating System designed for the 32- bit x86 architecture. Its purpose is to understand basic concepts of operating system design. These notes are
A Host Intrusion Prevention System for Windows Operating Systems
A Host Intrusion Prevention System for Windows Operating Systems Roberto Battistoni, Emanuele Gabrielli, and Luigi V. Mancini Dipartimento di Informatica, Università di Roma La Sapienza Via Salaria 113,
Encryption Wrapper. on OSX
Encryption Wrapper on OSX Overview OSX Kernel What is an Encryption Wrapper? Project Implementation OSX s Origins and Design NeXTSTEP Legacy NextStep v1 NextStep v3.3 Mac OS X Jobs creates NeXT Apple acquisition
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions Xi Xiong The Pennsylvania State University [email protected] Donghai Tian The Pennsylvania State University Beijing
Covert Channel Analysis and Detection using Reverse Proxy Servers
Covert Channel Analysis and Detection using Reverse Proxy Servers WJ Buchanan [A] and D Llamas [B] School of Computing, Napier University, EH10 5DT, Scotland, UK Keywords : Reverse Proxy Server, Covert
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
There s a kernel security researcher named Dan Rosenberg whose done a lot of linux kernel vulnerability research
1 There s a kernel security researcher named Dan Rosenberg whose done a lot of linux kernel vulnerability research That s unavoidable, but the linux kernel developers don t do very much to make the situation
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Attacking x86 Windows Binaries by Jump Oriented Programming
Attacking x86 Windows Binaries by Jump Oriented Programming L. Erdődi * * Faculty of John von Neumann, Óbuda University, Budapest, Hungary [email protected] Abstract Jump oriented programming
Topic 5a Operating System Fundamentals
Topic 5a Operating System Fundamentals What is an operating system? a computer is comprised of various types of software device drivers (storage, I/O, etc.) process and control software memory management
