Introduction to Malware. Engin Kirda
|
|
|
- Hester Hines
- 10 years ago
- Views:
Transcription
1 Introduction to Engin Kirda
2 Malicious Code
3 Overview Introduction to malicious code Taxonomy, life cycle Virus infection strategies, armored viruses, detection Worms - and exploit-based worms, spreading strategies Trojan horses key logger, rootkits, botnet, spyware demos that demonstrate danger of malicious code on local host 3
4 Introduction Malicious Code () software that fulfills malicious intent of author term often used equivalent with virus (due to media coverage) however, many different types exist classic viruses account for only 3% of malware in the wild Virus - Definition A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed 4
5 Taxonomy 5
6 Taxonomy Virus self-replicating, infects files (thus requires host) Worm self-replicating, spreads over network Interaction-based worms (B[e]agle, Netsky, Sobig) spread requires human interaction double-click and execute extension follow link to download executable Process-based worms (Code Red, Blaster, Slammer) requires no human interaction exploits vulnerability in network service 6
7 Reasons for Prevalence Mixing data and code violates important design property of secure systems unfortunately very frequent Homogeneous computing base Windows is just a very tempting target Unprecedented connectivity easy to attack from safety of home Clueless user base many targets available Malicious code has become profitable compromised computers can be sold (e.g., spam relay, DoS) 7
8 Virus Lifecycle Lifecycle reproduce, infect, run payload Reproduction phase viruses balance infection versus detection possibility variety of techniques may be used to hide viruses Infection phase difficult to predict when infection will take place many viruses stay resident in memory (TSR or process) Attack phase e.g., deleting files, changing random data on disk viruses often have bugs (poor coding) so damage can be done Stoned virus expected 360K, floppy, corrupted sectors 8
9 Infection Strategies Boot viruses master boot record (MBR) of hard disk (first sector on disk) boot sector of partitions e.g., Pakistani Brain virus rather old, but interest is growing again diskless work stations, virtual machine virus (SubVirt) File infectors simple overwrite virus (damages original program) parasitic virus append virus code and modify program entry point cavity virus inject code into unused regions of program code 9
10 Infection Strategies Entry Point Obfuscation virus scanners quickly discovered to search around entry point virus hijacks control later (after program is launched) overwrite import table addresses overwrite function call instructions Code Integration merge virus code with program requires disassembly of target difficult task on x86 machines W95/Zmist is a classic example for this technique 10
11 Macro Viruses Many modern applications support macro languages Microsoft Word, Excel, Outlook macro language is powerful embedded macros automatically executed on load mail app. with Word as an editor mail app. with Internet Explorer to render HTML I made this program to all those people who want to write Word 2000 virii, but don't know what the hell to do. 11
12 Virus Defense Antivirus Software working horse is signature based detection database of byte-level or instruction-level signatures that match virus wildcards can be used, regular expressions heuristics (check for signs of infection) code execution starts in last section incorrect header size in PE header suspicious code section name patched import address table Sandboxing run untrusted applications in restricted environment simplest variation, do not run as Administrator 12
13 Tunneling and Camouflage Viruses To minimize the probability of its being discovered, a virus could use a number of different techniques A tunneling virus attempts to bypass antivirus programs idea is to follow the interrupt chain back down to basic operating system or BIOS interrupt handlers install virus there virus is underneath everything including the checking program In the past, possible for a virus to spoof a scanner by camouflaging itself to look like something the scanner was programmed to ignore false alarms of scanners make ignore rules necessary 13
14 Polymorphism and Metamorphism Polymorphic viruses change layout (shape) with each infection payload is encrypted using different key for each infection makes static string analysis practically impossible of course, encryption routine must be changed as well otherwise, detection is trivial Metamorphic techniques create different versions of code that look different but have the same semantics (i.e., do the same) 14
15 Chernobyl (CIH) Virus 5B pop ebx 8D 4B 42 lea ecx, [ebx + 42h] 51 push ecx 50 push eax 50 push eax 0F 01 4C 24 FE sidt [esp - 02h] 5B pop ebx 83 C3 1C add ebx, 1Ch FA cli 8B 2B mov ebp, [ebx] 5B D 4B F 01 4C 24 FE 5B 83 C3 1C FA 8B 2B 15
16 Dead Code Insertion 5B pop ebx 8D 4B 42 lea ecx, [ebx + 42h] 51 push ecx 50 push eax 90 nop 50 push eax 40 inc eax 0F 01 4C 24 FE sidt [esp - 02h] 48 dec eax 5B pop ebx 83 C3 1C add ebx, 1Ch FA cli 8B 2B mov ebp, [ebx] 5B D 4B F 01 4C 24 FE 48 5B 83 C3 1C FA 8B 2B 16
17 Instruction Reordering 5B pop ebx EB 09 jmp <S1> S2: 50 push eax 0F 01 4C 24 FE sidt [esp - 02h] 5B pop ebx EB 07 jmp <S3> S1: 8D 4B 42 lea ecx, [ebx + 42h] 51 push ecx 50 push eax EB F0 jmp <S2> S3: 83 C3 1C add ebx, 1Ch FA cli 8B 2B mov ebp, [ebx] 5B EB F 01 4C 24 FE 5B EB 07 8D 4B EB F0 83 C3 1C FA 8B 2B 17
18 Instruction Substitution 5B pop ebx 8D 4B 42 lea ecx, [ebx + 42h] 51 push ecx mov eax, [esp] 83 C4 04 add 04h, esp 50 push eax 0F 01 4C 24 FE sidt [esp - 02h] C add 1Ch, [esp] 5B pop ebx 8B 2B mov ebp, [ebx] 5B D 4B C F 01 4C 24 FE C 5B 8B 2B 18
19 Advanced Virus Defense Most virus techniques very effective against static analysis Thus, dynamic analysis techniques introduced virus scanner equipped with emulation engine executes actual instructions (no disassembly problems) runs until polymorphic part unpacks actual virus then, signature matching can be applied emulation must be fast ANUBIS Difficulties virus can attempt to detect emulation engine time execution, use exotic (unsupported) instructions, insert useless instructions in the beginning of code to deceive scanner 19
20 Computer Worms A self-replicating program able to propagate itself across networks, typically having a detrimental effect. (Oxford English Dictionary) Worms either exploit vulnerabilities that affect large number of hosts send copies of worm body via Difference to classic virus is autonomous spread over network Speed of spreading is constantly increasing Make use of techniques known by virus writers for long time 20
21 Worm Components Target locator how to choose new victims Infection propagator how to obtain control of victim how to transfer worm body to target system Life cycle manager control different activities depending on certain circumstances often time depending Payload nowadays, often a Trojan horse (we come back to that later) 21
22 Target Locator harvesting consult address books (W32/Melissa) files might contain addresses inbox of client (W32/Mydoom) Internet Explorer cache and personal directories (W32/Sircam) even Google searches are possible Network share enumeration Windows discovers local computers, which can be attacked some worms attack everything, including network printers prints random garbage (W32/Bugbear) 22
23 Target Locator Scanning randomly generate IP addresses and send probes interestingly, many random number generators flawed static seed not complete coverage of address space scanning that favors local addresses (topological scanning) some worms use hit-list with known targets (shorten initial phase) Service discovery and OS fingerprinting performed as well 23
24 -Based Worms Often use social engineering techniques to get executed fake from address promise interesting pictures or applications hide executable extension (.exe) behind harmless ones (.jpeg) Many attempt to hide from scanners packed or zipped sometimes even with password (ask user to unpack) Some exploit Internet Explorer bugs when HTML content is rendered Significant impact on SMTP infrastructure Speed of spread limited because humans are in the loop can observe spread patterns that correspond to time-of-day 24
25 -Based Worms 25
26 -Based Worms 26
27 Exploit-Based Worms Require no human interaction typically exploit well-known network services can spread much faster Propagation speed limited either by network latency worm thread has to establish TCP connection (Code Red) by bandwidth worm can send (UDP) packets as fast as possible (Slammer) Spread can be modeled using classic disease model worm starts slow (only few machines infected) enters phase of exponential growth final phase where only few uncompromised machines left 27
28 Exploit-Based Worms 28
29 Worm Generators 29
30 Worm Defense Virus scanners effective against -based worms attachments can be scanned as part of mail processing Host level defense mostly targeted at underlying software vulnerabilities code audits stack-based techniques StackGuard, MS VC compiler extension address space layout randomization (ASLR) attempt to achieve diversity to increase protection 30
31 Worm Defense Network level defense intrusion detection systems scan for known attack patterns automatic signature generation is active research area rate limiting allow only certain amount of outgoing connections helps to contain worms that perform scanning personal firewall block outgoing SMTP connections (from unknown applications) 31
32 Trojan Horse Trojan horse is a malicious program that is disguised as legitimate software software may look useful or interesting (or at the very least harmless) term derived from the classical myth of the Trojan Horse Two types of Trojan horses 1. malicious functionality is included into useful program disk utility, screensaver, weather alert program famous compiler that generated backdoor into code 2. malware is stand-alone program possibly disguised file name (sexy.jpg.exe) 32
33 Trojan Horse Many different types and functions spy on (sensitive) user data log keystrokes, monitor surfing activity disguise presence rootkits allow remote access file transfer, remote program execution base for further attacks, mail relay (for spammers) Back Orifice, NetBus, SubSeven damage routines corrupting files participate in denial of service attacks 33
34 Rootkits Tools used by attackers after compromising a system hide presence of attacker allow for return of attacker at later date gather information about environment attack scripts for further compromises Traditionally trojaned set of user-space applications system logging (syslogd) system monitoring (ps, top) user authentication (login, sshd) 34
35 Kernel Rootkits Kernel-level rootkits kernel controls view of system for user-space applications malicious kernel code can intercept attempts by user-space detector to find rootkits Modifies kernel data structures process listing module listing Intercepts requests from user-space applications system call boundary VFS fileops struct 35
36 Linux Kernel Rootkits Linux kernel exports well-defined interface to modules Examples of legitimate operations registering device with kernel accesses to devices mapped into kernel memory overwriting exported function pointers for event callbacks Kernel rootkits violate these interfaces Examples of illegal operations replacing system call table entries (knark) replacing VFS fileops (adore-ng) 36
37 Linux Kernel Rootkits System call table hijacking orig_getuid = sys_call_table[ NR_getuid]; sys_call_table[ NR_getuid] = give_root; VFS hijacking pde = proc_find_tcp(); o_get_info_tcp = pde->get_info; pde->get_info = n_get_info_tcp; Works pretty much the same for Windows anyone remember the Sony rootkit discussion? 37
38 Windows Kernel Rootkits 38
39 Windows Kernel Rootkits Sony rootkit filters out any files/directories, processes and registry keys that contain $sys$ System call dispatcher uses system service dispatch table (SSDT) Windows NT kernel equivalent to system call table entries can be manipulated to re-route call to custom function ZwCreateFile used to create or open file ZwQueryDirectoryFile used to list directory contents (i.e. list subdirectories and files) ZwQuerySystemInformation used to get the list of running processes (among other things) ZwEnumerateKey used to list the registry keys below a given key 39
40 Rootkit Defense tripwire user-space integrity checker chkrootkit user-space, signature-based detector kstat, rkstat, St. Michael kernel-space, signature-based detector implemented as kernel modules or use /dev/kmem Limitations typically, rootkit must be loaded in order to detect it thus, detectors can be thwarted by kernel-level rootkit also suffer from limitations of signature-based detection 40
41 Rootkit Defense Kernel rootkits have complete control over operating system operating system is part of trusted computing base, thus applications can be arbitrarily fooled this includes all rootkit or Trojan detection mechanisms at best, an arms race can be started Proposed solutions trusted computing platform can enforce integrity of operating system smart cards attacker can not influence computations on card, but has still full control of computations performed on machine and information displayed on screen 41
42 Botnets Recent trend in malicious code development Often part of payload that is downloaded as Trojan horse or part of worm Definition of Bot An IRC user who is actually a program. On IRC, typically the robot provides some useful service. Examples are NickServ, which tries to prevent random users from adopting nicks already claimed by others. IRC (Internet Relay Chat) instant message (communication service) allows for many-to-many communication in channels 42
43 Botnets Bots first bots were programs used for Internet Relay Chat (IRC) react at events in IRC channels typically offer useful services malicious bots started to evolve takeover wars to control certain IRC channels often involved denial of service to force IRC net split nowadays, term refers to remote program loaded on a computer after compromise usage of IRC for command and control of these programs 43
44 Botnets Bots today implementation of several commands (e.g., DDoS) spreading mechanism to propagate further other functionality possible key logger SOCKS proxy spam relay some bots are even open source caused massive distribution and variations SDBot, AgroBot Bots can be incorporated in network of compromised machines Botnets (sizes up to tens of thousands) 44
45 Botnets 45
46 Botnet Defense Attack command and control infrastructure take IRC channel off-line when dynamic DNS is used for central command server, route traffic to black hole Honeypots vulnerable computer that serves no purpose other than to attract attackers and study their behavior in controlled environments when honeypot is compromised, bot logs into botnet allows defender to study actions of botnet owners 46
47 Spyware Any software that monitors and collects information about a user in a covert and unsolicited manner Goal of spyware collect sensitive user information and surfing habits Task of spyware component must monitor user behavior component must leak information to environment (OS, network) Often implemented as browser extensions Internet Explorer Browser Helper Object (BHO) COM object that can hook into Microsoft s Internet Explorer monitor/modify events 47
48 Spyware Interaction between browser and spyware component COM function invocations (exported by Internet Explorer) between spyware component and operating system Windows API calls In addition, it typically has a real company behind it that is making money from the information gathered Adware is any software that injects unsolicited advertisements into a user s workspace Scumware is a specific type of adware that hides other advertisements with those from its own controlling source 48
49 Spyware Typical routes of infection: 1. spyware is bundled with legitimate software package end-user license agreement (EULA) even informs about this fact EULA is very long (often hundreds of pages), user accepts classic examples are shareware programs P2P file-sharing clients (e.g., Kazaa) 2. drive-by downloads exploit browser bug, in particular, vulnerabilities of Internet Explorer WMF (Windows meta file) exploit, around Christmas 2005 arbitrary code execution via mismatched DOM objects (December 2005) insufficient ActiveX security settings 3. fake dialogs display Would you like to optimize your Internet and perform installation when user agrees 49
50 and Vulnerable Software 50
51 Conclusions sophisticated technology developed for more than 20 years combined with automatic spread mechanisms tools to generate malware significantly lower technological barrier Trojan Horses particularly dangerous because they infest trusted computing base typically full control of platform and applications Defense Techniques mostly reactive using signatures to detect known instances use best programming practice for application development, educate employees, keep infrastructure well maintained (patched) 51
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
SysSec Lecture 10. Aurélien Francillon [email protected]
SysSec Lecture 10 Aurélien Francillon [email protected] Aother interesting news: Diesel gate (talk at 32C3) https://media.ccc.de/v/32c3 7331 the_exhaust_emissions_scandal_dieselgate#video Malware Part
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
CS 356 Lecture 9 Malicious Code. Spring 2013
CS 356 Lecture 9 Malicious Code Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
INTRODUCTION TO MALWARE & MALWARE ANALYSIS
INTRODUCTION TO MALWARE & MALWARE ANALYSIS by Quick Heal R&D lab Security Simplified INTRODUCTION Very often people call everything that corrupts their system a virus without being aware about what it
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:
HALMSTAD UNIVERSITY Network Design and Computer Management Course Title: Network Security Project Title: WORMS Project members: - Tchape Philippe 841122-T099 - Jose Enrique Charpentier 830112-9154 Lecturer:
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Test Case - Privatefirewall 5.0, Intrusion and Malware Defense
Test Case - Privatefirewall 5.0, Intrusion and Malware Defense Objective and Methodology: Privatefirewall is a desktop defense application comprised of several distinct technology layers designed to block
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Different Types of Adware and Services
TABLE OF CONTENTS Adware... 2 Ad Server... 2 Backbone... 2 Backdoor... 2 Browser Hijacker... 2 Cookie... 2 Denial Of Service (Dos)... 3 Dialer... 3 Dumpster Diving... 3 E-Mail Harvester... 3 Encryption...
Chapter 14 Computer Threats
Contents: Chapter 14 Computer Threats 1 Introduction(Viruses,Bombs,Worms) 2 Categories of Viruses 3 Types of Viruses 4 Characteristics of Viruses 5 Computer Security i. Antivirus Software ii. Password,
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
COMPUTER-INTERNET SECURITY. How am I vulnerable?
COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Slides Used In The Course A note on the use of these slides: These
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
By:XÇzA A TÅÅtÜ ]A `t{åééw
By:XÇzA A TÅÅtÜ ]A `t{åééw By: Supervised By:Dr.. Lo ai Tawalbeh 1 New York Institute of Technology (NYIT)-Jordan s Campus Eng. Ammar Mahmood Introduction A backdoor in a computer system (or cryptosystem
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040682 6-9 Jul 2004 updated S3-040632 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040583 based on the comments in SA3#34 meeting Source:
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Computer Virus Strategies and Detection Methods
Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008 Computer Virus Strategies and Detection Methods Essam Al Daoud 1, Iqbal H. Jebril 2 and Belal Zaqaibeh 3 1 Department of Computer Science,
Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises
Security in DSL Networks Issues and Solutions for Small-to-Medium Sized Enterprises T E C H N I C A L P A P E R Security in DSL Networks The High Cost of Internet Security Breaches.... 1 Who is Most at
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
