SysSec Lecture 10. Aurélien Francillon
|
|
|
- Jordan Brooks
- 10 years ago
- Views:
Transcription
1 SysSec Lecture 10 Aurélien Francillon
2 Aother interesting news: Diesel gate (talk at 32C3) the_exhaust_emissions_scandal_dieselgate#video
3 Malware
4 Part 1: Introduction Part 2: Malware bestiary Part 3: Malware Analysis
5 Part 1: Introduction Part 2: Malware bestiary Part 3: Malware Analysis What it is Why it is so common Who are the authors Very short history Current situation
6 Introduction Malicious Code (Malware) Software that fulfills the malicious intent of the author Intentionally written to cause adverse effects on the system (it is NOT a vulnerable program) Comes in many flavors but all share a common characteristic: perform some unwanted activity on your system Term often used equivalent with virus (due to media coverage) However, a virus is just a particular type of malware Classic viruses account for only 3% of malware in the wild
7 Why The old hacker school Fun Show that something is possible Prove the author leetness The virus golden age Vandalism The new criminal age Steal information Control the machine DDos Spam Make money
8 Guess Who? >> Yesterday
9 Guess Who? >> Yesterday >> Today
10 The Rise of the Underground Economy Moving from Hack for Fun to Hack for Profit Traditional fraud mechanism combined with technological knowledge led to a well-established underground economy Understanding the technical side is not enough Monitor underground channels Understanding the economic structure (players, payments...) Find and disrupt weak links In this scenario, we do not need perfect solutions, we need solutions that make an attack vector economically not viable
11 Short History 1981 First widespread outbreak of a virus 1983 The first documented experimental virus Propagates on floppy disks for the Apple II platform Len Eidelmen coined the term virus in connection with self-replicating computer programs Fred Cohen s pioneering work on the topic 1987 File infectors Christmas Tree worm hit IBM Mainframes (500,000 replications / hour) 1987 The Vienna virus is the first one to intentionally destroy data 1988 First Worm: Internet worm Internet worm created by Robert Morris CERT is created 1989 IBM releases Viruscan for MS-Dos
12 Short History 1991 First polymorphic virus 1992 First virus to look for (and damage) an anti-virus 1995 First macro virus 1998 First Java virus 1999 Melissa Word macro virus + first large scale propagation 1999 Distributed denial of service (DDOS) 1999 Kernel Rootkits Knark (modification of system call table)
13 Short History 2000 Spyware 2000 First virus for mobile phones 2001 Code Red first large-scale, exploit-based worm 2003 SQL Slammer worm extremely fast propagation 2003 Sobig makes the first attempt to create a botnet 2007 Storm Worm+Botnet 2008 Rogue Antivirus 2008 Koobface targets Social Networks 2009 Conficker is the first pandemic malware infection Microsoft is still offering 250K $ to find the authors
14 Short History 2010 Stuxnet Several Zero day exploits, Stolen root certificates Pass air gap 2011 Duqu Malware Framework Zero day in MS Word Linked to Stuxnet? 2012 Flame Fake Microsoft certificate, using a MD5 Collision Used to impersonate update.microsoft.com! 2013 Red October Framework, 1000's modules, diplomatic targets In memory only, no disk persistence
15 Short History 2013 NSA Catalogue of implants Backdoors security products, standards FinFisher leaks (40GB of data leaked) Toolkit sold to governments (E.g. Bahrain) Packs zero days Targets many platforms (smartphones, etc...) PR docs says it bypasses 35 Anti Viruses 2014 Hacking team hacked Sells data to non democratic governments
16 Reasons for Malware Prevalence Homogeneous computing base Unprecedented connectivity easy to attack from safety of home Social engineering Windows is just a very tempting target many targets available Malicious code has become profitable compromised computers can be sold and used to make money A real economy
17 Are we Losing the Game? The overall picture: Malware industry is worth 100 billion dollars per year 60%-90% of websites are vulnerable to some kind of attacks 80% of the traffic out there is spam 50%-80% of computers connected to Internet are infected with spyware The economical side: A 26 year-old made 20 million $ with spam before being caught Phishing sites hosted by the Russian business network made an estimated 150 million $ with stolen bank credentials in 2006 Top rogue anti-virus "affiliates" make over $ a month
18 The Size of the Problem
19 Part 1: Introduction Part 2: Malware bestiary Part 3: Malware Analysis Malware classification The main flavors Infection mechanisms Propagation strategies Defense
20 Taxonomy Self Spreading Computer Virus Trojan Horse Keylogger Non Spreading Rootkit Need an host program Worms Spyware Dialers Self contained program
21 One Malware Many Names Malware writers would like to name themselves The first identifier of a new sample is the one that typically assign the name this is of course not possible however, people (and anti-virus companies) work in parallel Each anti-virus company has its own notation causes confusion and often multiple names attempts to create a unique naming and identification notation
22 Example: Virus Total
23 Virus A program that can infect other programs by modifying them to include a, possibly evolved, version of itself -- Fred Cohen (1983) Distinguishing features: Reproduce its own code Attach itself to other files (a virus cannot survive by itself) Get executed when the infected executable file is executed
24 Where is it? Word doc Kernel Hypervisor Hardware
25 Where is it? File infection overwrite virus Word doc Kernel Hypervisor Hardware substitute the original program parasitic virus append virus code before or after the program modify program entry point cavity virus install inside of the file it is infecting usually in empty gaps inside the program binary
26 Where is it? Macro infection Word doc Many modern applications support macro languages Microsoft Word, Excel, Outlook macro languages are powerful Embedded macros automatically executed on load Infection Trough an Exploit Kernel Hypervisor Hardware MS Word and Acrobat are common victims
27 Where is it? Word doc Boot infection Kernel Hypervisor Hardware master boot record (MBR) of hard disk (first sector on disk) boot sector of partitions rather old, but interest is growing again
28 Virus Defense Antivirus Software Mainly signature based detection database of byte-level or instruction-level signatures that match virus wildcards and regular expression can be used md5 of known malicious programs Heuristics (check for signs of infection) code execution starts in last section incorrect header size in PE header suspicious code section name patched import address table Behavioral signatures Sandboxing run untrusted applications in restricted environment
29 Worms A computer worm is a self-replicating computer program that uses a network to send copies of itself to other nodes Distinguishing features: Autonomous spread over network It is self-contained (it does not need to be embedded in a file like a virus) Speed of spreading is constantly increasing (can cause enormous damage to the network) Make use of techniques known by virus writers for long time
30 Worm Propagation harvesting consult address books (W32/Melissa) files might contain addresses inbox of client (W32/Mydoom) Internet Explorer cache and personal directories (W32/Sircam) Network share enumeration Windows discovers local computers, which can be attacked some worms attack everything, including network printers Scanning randomly generate IP addresses and send probes interestingly, many random number generators flawed static seed not complete coverage of address space some worms use hit-list with known targets (shorten initial phase)
31 Mail-based Propagation Often use social engineering techniques to get executed fake from address promise interesting pictures or applications hide executable extension (.exe) behind harmless ones (.jpeg) Many attempt to hide from virus scanners zipped, sometimes even with password (ask user to unpack) Some exploit Internet Explorer bugs when HTML content is rendered Speed of spread limited because humans are in the loop can observe spread patterns that correspond to time-of-day
32 Exploit-based Propagation Require no human interaction typically exploit well-known network services can spread much faster Propagation speed limited either......by network latency worm thread has to establish TCP connection (Code Red)...by bandwidth worm can send (UDP) packets as fast as possible (Slammer) Spread can be modeled using classic disease model worm starts slow (only few machines infected) enters phase of exponential growth final phase where only few uncompromised machines left
33 Example: CodeRed (July 2001) Exploits known buffer overflow in IIS Idq.dll Propagates through an HTTP request (TCP) Malicious code stays in memory Target: DDOS Vulnerable population (360,000 servers) infected in 14 hours
34 Example: Slammer (January 2003) The worm Exploits a vulnerability in Microsoft SQL Server disclosed 7 months before Propagates through a single 380 byte UDP packet In approximately three minutes, the worm achieved its full scanning rate (more than 55 million scans per second) 75,000 victims infected within ten minutes Consequences The worms packets saturated many Internet links numerous routers collapsed under the burden of extremely high bombardment traffic Problem in ATM and emergency nubmers (911 systems) 2 to 5 of the 13 root DNS shut down Cancelled airline flights
35 Detecting and Measuring Worms Propagation Observe and measure traffic targeting the dark (unused) address-space of the network All incoming traffic in a darknet is suspicious by definition Manifestation of different events Attackers probing blindly Random scanning from worms DOS (backscattered effect due to IP spoofing) Example: UCSD network telescope is a class 8 network (~ 1/256 of the Internet)
36 Worms Defense Virus scanners effective against -based worms Host level defense mostly targeted at protecting the software from remote exploitation stack protection techniques address space layout randomization (ASLR) attempts to achieve diversity to increase protection do not protect when users execute malware themselves! Network level defense intrusion detection systems limit the number of outgoing connections fast and automatic signature generation is active research area helps to contain worms that perform scanning personal firewall block outgoing SMTP connections (from unknown applications)
37 Trojan Horses Class of malware that appears to perform a desirable function but it also performs undisclosed malicious activities Distinguishing features: Require the user to explicitly run the program Unable to make copies of themselves or self-replicate Can be used to perform any kind of malicious activity
38 Trojan Horses Two types of Trojan horses Malicious functionality is included into useful program games, disk utility, screensaver.. famous compiler that included backdoor into code The malware is a stand-alone program possibly disguised file name (sexy.jpg.exe) Many different types and malicious functionalities spy on sensitive user data (spyware) disguise presence (rootkit) allow remote access (backdoor) base for further attacks, mail relay (for spammers) damage routines (corrupting files)
39 How did the Horse get Inside the Machine? Mainly through social engineering (aka, user stupidity) The user... open a suspicious mail attachment
40 How did the Horse get Inside the Machine? Mainly through social engineering (aka, user stupidity) The user... open a suspicious mail attachment The user... follow a link to an infected site The user... download and execute an unknown binary
41 How did the Horse get Inside the Machine? Mainly through social engineering (aka, user stupidity) The user... open a suspicious mail attachment The user... follow a link to an infected site The user... download and execute an unknown binary The user... download an infected file using a file sharing software In Limewire, 68% of all downloadable executable, archival, and Microsoft Office file extensions contain malware (*Kalafut 06)
42 Spyware Software that secretly monitors the user's behavior and collects private information without the user knowledge Distinguishing features: Threat to the user privacy Hidden from the user and usually difficult to detect Leak sensitive information (credit card numbers, visited webpages, passwords..) to someone else over the internet Often implemented as a browser plugin/extension
43
44
45 Keyloggers Simple idea but dangerous threat Records key strokes typed by user Typically used to capture interesting user data key logger runs as process in the background passwords, information for social engineering attacks ( s) successful independent of any application-level protection or networklevel protection (e.g., by using encrypted traffic) Key loggers are quite easy to write easy to re-implement and therefore difficult to recognize by antivirus scanners because not encountered in the wild before
46 Keyloggers Message handling mechanism Windows NT kernel processes key press interrupt then sends message to active application SetWindowsHookEx (Windows API function) Installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. GetAsyncKeyState (Windows API function) They have legal applications (hotkeys) Determines whether a key is up or down at the time the function is called, and whether the key was pressed after a previous call to GetAsyncKeyState.
47 Old style keylogger
48 Old style keylogger
49 Old style keylogger
50 Old style keylogger
51 Old style keylogger
52 Spyware Infection Bundled with legitimate software package end-user license agreement (EULA) even informs about this fact classic examples are shareware programs Drive-by downloads EULA is very long (often hundreds of pages), user accepts Javascript code contained in malicious webpage launches a number of exploit against the browser or its components (typically ActiveX) WMF (Windows meta file) exploit, around Christmas 2005 insufficient ActiveX security settings Fake dialogs display Would you like to optimize your Internet and perform installation when user agrees
53 Rootkits The goal of a rootkit is to disguise the existence of a malicious program in a system Distinguishing features: Installed by an attacker after a system has been compromised Hide the presence of the attacker and allows him to return on a later time Difficult to detect
54 Rootkits Types Userspace rootkits Replace system programs with trojaned versions system browsing (ls, find) system logging (syslogd) system monitoring (ps, top, netstat) user authentication (login, sshd) Kernel rootkits Modify the kernel data structures to hide processes, files, and network activities Installed by Kernel patch Loadable Kernel Module Kernel memory patching (/dev/kmem)
55 Where is it? Trojaned programs Userspace Modified Kernel Kernel Hypervisor Rootkits Hypervisor Hardware Shift the entire operating system under a virtualized environment Since it runs below the operating system, it may be extremely difficult to detect
56 The Sony Rootkit Copy protection measures included by Sony on compact discs in 2005 Installed a rootkit that filters out any files/directories, processes and registry keys that contain $sys$ Very easy to reuse for other malware writers to hide their files by simply using the same name System call dispatcher uses system service dispatch table (SSDT) Windows NT kernel equivalent to system call table Entries can be manipulated to re-route call to custom function ZwCreateFile - create or open file ZwQueryDirectoryFile - list directory contents (list subdirectories and files) ZwQuerySystemInformation - get the list of running processes (among other things) ZwEnumerateKey - list the registry keys below a given key
57 Rootkit Defense Userspace Tripwire (user-space integrity checker) Chkrootkit (user-space, signature-based detector) Kernelspace KSTAT (Kernel Security Therapy Anti-Trolls) Linux tool that uses several methods to check the integrity of the running kernel sys_read 0xc Warning! Should be at 0x12699c Kernel code signature Limitations Kernel rootkits have complete control over operating system All applications can be arbitrarily fooled (including rootkit detectors) At best, an arms race can be started Best is on an offline system (or a vm snapshot) Hypervisor-based detectors (?)
58 Bots and Botnets A bot (aka zombie or drone) is a compromised machine that can be controlled by an attacker remotely * Originally automated programs used to provide useful services on Internet Relay Chat (IRC) channels Distinguishing features: Remote control facility Implementation of different commands Infected machines are incorporated in large networks (botnets) that are controlled by the botmaster like an army Loaded on a computer after compromise (eg. by a trojan or a worm)
59 Botnets The attacker control a Command and Control (C&C) server All the bots contact the C&C to: report their status receive commands
60 Botnets (example of available commands) Harvest addresses from host Log all keypresses Sniff network traffic Take screenshots Start an http server that allows to browse C: Kill a hard-coded list of processes (AV programs, rival malware) Steal windows CD keys Sets up a proxy to be used as a "stepping stone" for SPAM Download file at an url Run a shell command Update (allows to change the available commands!)
61 C&C Mechanisms The most distinguishing and powerful feature of Botnets... C&C brings a great flexibility to the activities that can be performed by bots However, C&C is also the weakest link of the system As long as there is an update command defined for the bots the botmaster can change the command set by updating her bots shutdown C&C, and all bots become harmless Real botnets don't have a single C&C server even trinoo (1999) allowed multiple masters!
62 Centralized C&C Two approach to issue commands Push style C&C (e.g. IRC) Pull style C&C (e.g. HTTP) Multiple C&C servers (typically http/irc) multiple layers of hosts between bot and botmaster (hard to trace back) Address of C&C server(s) must be available to each bot in binary, config file, etc frequently updated Large botnets often partitioned into several smaller ones each bot knows only a few C&C servers you do not know everything about a botnet just by looking at 1 sample
63 Push vs. Pull Push style C&C Pull style C&C
64 Common C&C Channels IRC used because it is directly suitable to the purpose of sending commands to bots also for historic reasons legitimate IRC server can be used, acts as stepping stone sdbot/agobot/phatbot source-code is available quite unusual on modern networks! (suspicious/blocked...) HTTP outgoing HTTP allowed everywhere (sometimes through proxy) a lot of complex applications are delivered on top of HTTP hard to model "normal" HTTP traffic difficult to detect "unusual" botnet traffic
65 Peer-to-Peer C&C Alternative to client-server architecture More robust bot commands propagate in a p2p network more difficult to catch the botmaster even if some of the nodes in the network are shut down, the gaps in the network are closed and the network continues its activities Custom peer-to-peer protocol The new, unknown traffic can be noisy A bot needs a way to find new neighbors Standard peer-to-peer protocol allows C&C traffic to blend in with legitimate p2p traffic legitimate p2p is still blocked in many locations
66 Bullet-Proof Hosting Sometimes C&C is hosted by ISPs that are completely unresponsive to abuse complaints De-peering: other ISPs rescind their peering agreements with the malicious ISPs In these cases, a solution can be to take down the entire ISP evidence is required that abuse breached clauses of peering contracts may involve law enforcement, FTC, etc Examples: Russian Business Network (2007), Atrivio (2008), McColo (2008), 3FN (2009), Voze (2011),
67 Fast-Flux Round Robin DNS A DNS answer consists of several DNS A records. Each time the order of the answer list is different The idea behind this is to balance the workload on different servers TTL value Normally, the DNS records include a TTL value between 1 and 5 days for taking benefit from the DNS caching system Content Delivery Networks (CDN) sets the TTL value to very low values, i.e., between 0 and 900 seconds Fast-Flux Several IP addresses in the DNS record Low TTL value Usage of round robin DNS
68 The Torpig Botnet Mebroot is a rootkit that takes control of a machine by replacing the system s Master Boot Record (MBR) This allows Mebroot to be executed at boot time, before the operating system is loaded, and to remain undetected by most anti-virus tools Mebroot has no malicious capability per se. Instead, it provides a generic platform to manage (install, uninstall, and activate) other malicious modules The Torpig botnet is an example of such malware
69 Hijacking the Torpig Botnet Torpig use a technique for locating its C&C servers called domain flux each bot uses an algorithm to compute a list of domain names this list is computed independently by each bot and is regenerated periodically (every week) each bot attempts to contact the hosts in the list in order until one succeeds Researchers at UCSB reverse engineered the domain flux algorithm They predict the C&C domain that was going to be used some time in the future By registering that domain, they took control of the botnet for 10 days Data collected 70GB from 52,540 different infected machines 297,962 unique username/password (of which 8,310 for bank accounts) 1,235,122 windows password 1,258,862 accounts...
70 Bots Defense Attack command and control infrastructure take IRC channel off-line when dynamic DNS is used for central command server, route traffic to black hole Honeypots vulnerable computer that serves no purpose other than to attract attackers and study their behavior in controlled environments when honeypot is compromised, bot logs into botnet allows defender to study actions of botnet owners
71 The Malware Share (Panda 09)
72 Malware targeting Critical Infrastructures 7 2
73 Stuxnet Malware that (probably) targeted Iranian Nuclear centrifuges Spreads by Copying itself to USB drives Network shares Using two known and four 0-day Microsoft vulnerabilities Windows rootkit to hide Windows binaries Signed by one of 2 stolen certificates from JMicron and Realtek 7 3
74 Stuxnet Injects STL code into Siemens PLCs (Progammable Logic Controllers) Uses rootkit techniques to hide injected PLC code Patches Siemens Step 7 software (used to view PLC code) Communicates with C&C servers using HTTP Steals designs documents for industrial control systems Sabotages targeted industrial control systems 7
75 Part 1: Introduction Part 2: Malware bestiary Part 3: Malware Analysis Advanced malware techniques Static & Dynamic analysis Large scale malware analysis Anubis Malware statistics
76 Two Problems Detecting malware samples It is not possible to build a perfect virus/malware detector (Cohen) Current anti-viruses are mostly black-list based The number of malware samples is growing so fast that it (probably) already surpassed the number of good software (goodware) Malware writers try to change the binary at every infection to defeat signatures Identifying new malware samples Too many new samples to analyze ( automated analysis) Many samples are variations of the same malware ( clustering) Static analysis is insufficient ( dynamic analysis) Dynamic analysis is problematic (??)
77 Malware Hardening Entry Point Obfuscation virus scanners quickly discovered to search around entry point virus hijacks control later (after program is launched) overwrite import table addresses overwrite function call instructions Code Integration merge malware code with target program requires disassembly of target (difficult task on x86 machines) W95/Zmist is an example for this technique Decompile the target code Insert itself Re-generate code and data reference Assemble the final code
78 Poli- and Meta-morphism Polymorphic malware Change layout (shape) with each infection The payload is encrypted using a different key for each infection A decryption routine decrypt and execute at runtime the payload but maintain the algorithm intact of course, the decryption routine must be changed as well Makes static string analysis practically impossible Metamorphic malware Create different versions of code at each infection The new code is different but equivalent to the previous one (i.e., it has the same semantic)
79 Chernobyl (CIH) Virus 5B 8D F 5B 83 FA 8B B C 24 FE C3 1C 2B pop ebx lea ecx, [ebx + 42h] push ecx push eax push eax sidt [esp - 02h] pop ebx add ebx, 1Ch cli mov ebp, [ebx] 5B D 4B F 01 4C 24 FE 5B 83 C3 1C FA 8B 2B
80 Dead Code Insertion 5B pop ebx 8D 4B 42 lea ecx, [ebx + 42h] 51 push ecx 50 push eax 90 nop 50 push eax 40 inc eax 0F 01 4C 24 FE sidt [esp 02h] 48 dec eax 5B pop ebx 83 C3 1C add ebx, 1Ch FA cli 8B 2B mov ebp, [ebx] 5B D 4B F 01 4C 24 FE 48 5B 83 C3 1C FA 8B 2B
81 Instruction Reordering 5B EB 09 pop ebx jmp <S1> S2: 50 0F 01 4C 24 FE 5B EB 07 push eax sidt [esp 02h] pop ebx jmp <S3> S1: 8D 4B EB F0 lea ecx, [ebx + 42h] push ecx push eax jmp <S2> S3: 83 C3 1C FA 8B 2B add ebx, 1Ch cli mov ebp, [ebx] 5B EB F 01 4C 24 FE 5B EB 07 8D 4B EB F0 83 C3 1C FA 8B 2B
82 Instruction Substitution 5B D 4B C F 01 4C 24 FE C 5B 8B 2B pop ebx lea ecx, [ebx + 42h] push ecx mov eax, [esp] // push eax add 04h, esp push eax sidt [esp 02h] add 1Ch, [esp] // pop ebx pop ebx // add ebx, 1Ch mov ebp, [ebx] 5B D 4B C F 01 4C 24 FE C 5B 8B 2B
83 Packers Originally, runtime packers were developed to compress the executable of an application in order to reduce the binary size They soon started to be adopted to protect the application from reverse engineering A packer takes an executable as input and generate a packeted version of the executable that include the runtime unpacking routine Features that malware writers found very useful Recent packers functionalities Compress Encrypt Randomize (polymorphism) Anti-debug technique (int / fake jmp) Anti-VM Virtualization (e.g., Themida)
84 Packers In some case, the reverse transformation is possible In some cases, the reverse transformation is very hard or almost impossible Unpacking tools exist for some packers The original program is translated into a different randomly generated language The executable is shipped with a metamorphic emulator that execute the new language The size of the final executable is sometimes much bigger than the original (helloworld.exe packed with Themida is 0.5 Megabyte) Packers make static analysis impossible, and dynamic analysis more complicated
85 The Anti-virus Reaction Simple evasion technique are very effective against static analysis Thus, dynamic analysis techniques introduced virus scanner equipped with emulation engine executes actual instructions (no disassembly problems) runs until polymorphic part unpacks actual virus then, signature matching can be applied emulation must be fast Difficulties virus can attempt to detect emulation engine time execution, use exotic (unsupported) instructions, insert useless instructions in the beginning of code to deceive scanner
86 Behavior-Based Signatures Are there differences between malicious and benign behavior? Is it possible to exploit those differences to realize behaviorbased signatures that can match bot known and unknown malware? Many antivirus products claim to already adopt this approach Still an open question...
87 Malware Analysis Understanding functionality of malware programs modifications to compromised system understand questions such as: how is program launched, what malicious actions are performed, hidden functionality (with trigger), disabling of defense mechanisms, interaction with other processes Necessary both for detection and removal Must keep up with increasing numbers of samples fast automated (at least, provide as much support as possible) precise
88 Malware Analysis Static techniques analyze binary for strings, symbols, and library functions disassemble binary image Try to make sense of the assembler code... Dynamic techniques observe interaction with environment observe interaction with operating system file system, network, registry system calls debug process
89 Static Analysis: Disassembler Linear sweep disassembler start at beginning of code (.text) section disassemble one instruction after the other assume that well-behaved compiler tightly packs instructions objdump uses this approach Obfuscation Attack insert data (or junk) between instructions and let control flow jump over this garbage disassembler gets confused
90 Static Analysis: Disassembler Recursive traversal disassembler aware of control flow start at program entry point disassemble one instruction after the other, until branch or jump is found recursively follow both (or single) branch (or jump) targets not all code regions can be reached indirect calls and indirect jumps use a register to calculate target during run-time for these regions, linear sweep is used IDA Pro uses this approach Obfuscation Attack replace direct jumps (calls) by indirect ones force disassembler to revert to linear sweep, and then use previous attack
91 The Static (and Manual) Approach
92 Limit of Static Analysis In a perfect world, static analysis could tell you everything about a program But in real life, static analysis gives an approximate picture at best Impossible to predict the runtime behavior of all but the simplest programs Polymorphic, Encrypted, and Packeted samples are very very hard to analyze It is still a powerful tool in the hand of an expert analyst But it is very difficult to automatize and apply at a large scale
93 Dynamic Analysis Execute code in a controlled environment instrument program, operating system, or hardware Advantages sees instructions that are actually executed can inspect actual program behavior and data values (at least one) target of indirect jumps (or calls) can be observed Problems of dynamic analysis in general, single path (execution trace) is examined analysis environment possibly not invisible analysis environment possibly not comprehensive may launch real attacks scalability issues
94 Setting Up an Analysis Environment Running malware on your everyday machine is not a good idea Real hardware vs Virtual Machine Virtual machine are detectable Real machine are less scalable, more difficult to restore, and more difficult to instrument Real Internet connection vs Simulated Network Containing malicious activities (spam, DOS, attacks, scans) Internet connection may be required to observe the real behavior (bots) The analysis environment must be restored to a pristine state after each analysis Norton Ghost (or similar toosl) to restore the disk CoreProtect write cache card Virtual machine snapshots
95 Large-Scale Malware Analysis Refers to the problems that we need to deal with when dynamic malware analysis is used to examine 1) Large numbers of malicious files 2) Over longer periods of time 3) Adversarial samples (i.e., evasion) Large-scale analysis is needed by Anti-malware companies and institutions Security organizations (e.g., government) Large ISPs Automated honeypots
96 Anubis A platform for dynamic malware analysis Runs the binary in a QEMU emulated environment Monitors Windows API and system service calls Records network traffic Tracks data flows Anubis receives samples through A public web-interface ( A number of feeds from security organizations Some of our users are Shadow Server, Team Cymru, CERT Australia, law-enforcement agencies, ISPs, banks, anti-virus companies 20K-30K new samples analyzed per day
97 Sample Upload via HTTP Firewall Web / DB SRV Report Store Sample Store Worker(s) Worker Worker(s) VMs Victim SRV
98
99
100
101 Malware Clustering Partition a given set of malware samples into subsets so that subsets share some common traits (i.e., find virus families ) Extremely useful to group together polymorphic samples Help analysts understanding the behavior of new samples Blaster Phishing Slammer
102 A View from Above Shift the focus from a single malware sample to a global picture of all the collected samples Extract concrete statistics on specific malware features Objectives Shed light on common malicious host behavior Confirm or deny folk wisdom Investigate the influence of code polymorphism on statistics
103 A Glimpse into Common Malware Behaviors Filesystem 37.2% of all samples create an executable file 62% under the C:\Windows directory 38% inside the user's home folder (under C:\Document and Settings) Might indicate that malware is increasingly designed to run as a normal user!! Only 0.27% attempt to clear any records of its activity from log data Registry 35.8% of all samples modify the registry to get launched at startup 33.7% disable the windows firewall 8.97% tamper with security settings (MSWindows\Security) Network Only 47.3% of samples that show network activity also query the DNS to resolve a domain name (9.2% of the cases, no result was returned) 8.9% of the samples connect to a remote site to download a second-stage executable
104 Sandbox Detection How many samples hide their behavior by detecting Anubis and/or the underlying emulation system? Sandbox detection techniques: API-level: query the environment by calling (native or Windows) API functions API-level Instruction-level: rely solely on CPU instructions 0.03% contain a known Anubis check 0.51% are protected with a packer that is known to be not correctly emulated in Qemu So far, no need to have any way to find instruction-level techniques Anubis team developing a new technique based on parallel execution with input replay
105 But Remember... it's an Arms Race
106 But Remember... it's an Arms Race
107 But the Bad Guys Don't Win Every Time! Koobface botnet authors tracked down by Sophos security and others All details available here:
108 Online users leave traces, bad guys as well Social networks!! Domains registration Phone numbers Pictures at events Company registration Blatant mistakes Source code backups available Web stats interfaces not protected Geo tagged pictures (!) Same phone numbers used for different purposes
109 Examples domain: HIGHSPEED.RU nserver: ns.masterhost.ru. nserver: ns1.masterhost.ru. nserver: ns2.masterhost.ru. state: REGISTERED, DELEGATED, UNVERIFIED person: Roman K. phone: <omitted>99 e mail: [email protected] registrar: RUCENTER REG RIPN created:
110 The discovered network
111 That's it Questions?
Introduction to Malware. Engin Kirda [email protected]
Introduction to Engin Kirda [email protected] Malicious Code Overview Introduction to malicious code Taxonomy, life cycle Virus infection strategies, armored viruses, detection Worms email- and exploit-based
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
CS 356 Lecture 9 Malicious Code. Spring 2013
CS 356 Lecture 9 Malicious Code Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
CSE509 System Security
CSE509 System Security Malware and bots Nick Nikiforakis [email protected] Malware Malware, short for malicious software, is software designed to gain access to confidential information, disrupt computer
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
DDoS Attacks & Defenses
DDoS Attacks & Defenses DDOS(1/2) Distributed Denial of Service (DDoS) attacks form a significant security threat making networked systems unavailable by flooding with useless traffic using large numbers
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:
HALMSTAD UNIVERSITY Network Design and Computer Management Course Title: Network Security Project Title: WORMS Project members: - Tchape Philippe 841122-T099 - Jose Enrique Charpentier 830112-9154 Lecturer:
ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Slides Used In The Course A note on the use of these slides: These
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
Test Case - Privatefirewall 5.0, Intrusion and Malware Defense
Test Case - Privatefirewall 5.0, Intrusion and Malware Defense Objective and Methodology: Privatefirewall is a desktop defense application comprised of several distinct technology layers designed to block
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Detecting the One Percent: Advanced Targeted Malware Detection
Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Malicious Email Mitigation Strategy Guide
CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
