Modern Malware: Tactics & Countermeasures
|
|
|
- Elijah Hamilton
- 9 years ago
- Views:
Transcription
1 Modern Malware: Tactics & Countermeasures
2 General Agenda Tactics of modern malware Countermeasures with Next Generation FW Page Palo Alto Networks
3 Tactics of Modern Malware
4 Goal of the session Showing the different stages that take place during a modern malware infection Understanding the sophistication and dedication required to build up an APT (APT Advanced Persistent Threat) Learning the different mechanisms that the attackers use It s important to note that using this tactics against real sites or users may be punished by law Page Palo Alto Networks Slide 4
5 What has changed / What remains the same The attacker has changed - Nation-States - Criminal organizations - Political groups The strategy has evolved - Patient process, step by step - User compromise and future expansion The technique has evolved - New ways for sending malware - Communication hiding - Signatures evasion It s not the end of the world - It s not new, just more common - There are solutions - Don t believe it has been because of APT Page Palo Alto Networks
6 Cyber Threats: A National Topic "We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions and our air-traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy. President Obama State of the Union Address February 2013 "But even more alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. More than 30,000 computers that it infected were rendered useless and had to be replaced. It virtually destroyed 30,000 computers. Imagine the impact an attack like that would have on your company or your business. The collective result of these kinds of attacks could be a cyber Pearl Harbor. Leon Panetta - Former Director of the CIA, Current Secretary of Defense Page Palo Alto Networks. Proprietary and Confidential.
7 Recent Victim of a Malware Attack The attack followed an exposé on corruption and influence peddling in China s ruling Communist Party Attackers planted 45-pieces of malware on Times systems 44 of which were undetected by traditional desktop antivirus software Used university networks as a staging ground for the assault Source: Page Palo Alto Networks. Proprietary and Confidential.
8 The Strategic Role of Modern Malware Infection Escalation Remote Control Malware provides the internal foothold to control and expand a sustained attack
9 The challenges to traditional security Threats are using different techniques, but security remains segmented Exploits, malware, spyware, obfuscation Threats are using the weak points on security to avoid being discovered The most patient attacks need to go over the perimeter several times without being detected Targeted and customized malware is capable of evading traditional signatures Attacks with new malware, which has never seen before, are increasing Page Palo Alto Networks.
10 The Gaps in Traditional Antivirus Protection Modern malware is increasingly able to: - Avoid falling into traditional AV honey-pots - Evolve before protection can be delivered Targeted and custom malware Polymorphic malware Newly released malware Highly variable time to protection WildFire finds unique new malware samples undetectable by leading antivirus software every day. Page Palo Alto Networks. Proprietary and Confidential.
11 The Evolving Threat Landscape Hacktivism and Affiliates Low to medium sophistication, politically motivated sabotage and theft Examples: Anonymous, LulzSec, Pr0j3ct M4yh3m Organized Cybercrime Medium to high sophistication, large-scale theft of financial data, hack-for-profit Examples: Russian Business Network Nation-State Actors Highly sophisticated, persistent, and well funded intelligence gathering. Examples: Aurora, Titan Rain, Shady RAT, GhostNet
12 They have a complex structure usually Botnet kits authors Phising developer Spam senders drive-by experts Carders Page Palo Alto Networks
13 Lifecycle of a Modern Threat
14 Stages and processes in modern malware We will cover the technical aspects related to each of these stages Bait Exploit Download Back channel Steal Page Palo Alto Networks
15 Attack Stages of Modern Malware Targeted malicious sent to user Malicious website exploits client-side vulnerability User clicks on link to a malicious website Drive-by download of malicious payload Page Palo Alto Networks. Proprietary and Confidential.
16 Scope of the problem RSA case detailed CVE Fuentes: Page Palo Alto Networks Slide 16
17 Scope of the problem RSA case detailed Page Palo Alto Networks Slide 17
18 Baiting the user: content obfuscation
19 Content obfuscation Definition (Wikipedia): In software development, obfuscated code is the deliberate act of making source or machine code difficult to understand by humans. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic to prevent tampering, deter reverse engineering, or as a puzzle or recreational challenge for someone reading the source code. Page Palo Alto Networks Slide 19
20 Content obfuscation Target: Deceive the user so that it will click over a URL or malicious file which doesn t look malicious. Evade pattern matching detection systems for malicious code. Actions: Build URLs that don t appear to be malign to the end user, using different mechanisms. Hide real file extensions, using others considered to be benign. Modify the Javascript code to make it unreadable, as an obfuscation tactic to evade pattern matching detection systems. Page Palo Alto Networks Slide 20
21 URLs obfuscation Use of strings that look good over IPs instead of names: Use of symbol. Everything on the left side is not used (detected by most modern browsers): Use of lengthy strings so that they don t fit in the browser address bar. URL coding using hex, dword or octal: ( Page Palo Alto Networks Slide 21
22 URLs obfuscation Use of similar domains, but not valid, hidden under false tags. (note the real link and the one that the attacker is trying to simulate Image mapping with malicious URLs. As soon as the victim clicks anywhere on the image is redirected to a false page, usually similar to the real one. Let s see an example with the following html code and its result: Page Palo Alto Networks Slide 22
23 Hiding of real file extensions The tactic is known since 2007 but it s now when a lot of activity has been detected in malware (starting specially in 2011). It s based upon the support that Unicode offers to multiple languages, include those where writing is done from right to left (like arabic or hebrew). Unicode has a variety of RTL (Right To Left) and LTR codes (Left To Right) so that after them the content is reversed. Furthermore the codes are invisible. All versions of Windows, starting with Vista, are vulnerable by default. Older versions require the installation of support for RTL languages. Page Palo Alto Networks Slide 23
24 Hiding of real file extensions: Example First we select the character U+202E with the Windows character map tool (RTL Right To Left): Page Palo Alto Networks Slide 24
25 Hiding of real file extensions: Example After we rename the file chosing the right name. In our example we will rename notepad.exe as notepad[u+202e]cod.exe : Note that in the Windows CLI the file is properly displayed, including a? character, representing the RTL one. Page Palo Alto Networks Slide 25
26 Hiding of real file extensions: Example On the other hand, and via the file explorer, the change works (modifying the icon would be trivial as well): These tecniques could be valid also for addresses or URLs, depending on the client program that the end user is utilizing. Page Palo Alto Networks Slide 26
27 Hiding of real file extensions: Example It s of course possible playing with more complex names, i.e.: [RTLO]cod.yrammusevituc[LTRO]n1c[LTRO].exe, that will be displayed as nc1.executivesummary.doc in the Windows file explorer. Other O.S. like Ubuntu or MAC are also able to interpret RTL characters: Page Palo Alto Networks Slide 27
28 Searching for lambs: Scanning and abusing LFI & RFI
29 RFI Remote File Inclusion Definition (Wikipedia): Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file, but depending on the severity, to list a few it can lead to: Code execution on the web server Code execution on the client-side such as JavaScript... Denial of Service (DoS) Data Theft/Manipulation. Page Palo Alto Networks Slide 29
30 LFI & RFI attacks Target: Inject some local file in a server where we are not administrators (LFI), or doing it via a redirection to a remote one (RFI), with the goal of using it later as a landing site. Actions: Use LFI/RFI scanners. Search sites by hand. The sites built up using PHP are usually good candidates. Of course it s possible to use alternative tactics to LFI/RFI in order to get the control of the server (for instance all the ones that we reviewed in the event of web attacks). This is just another example on this area. Page Palo Alto Networks Slide 30
31 LFI+RFI: An example of PHP vulnerable code <html> <head> <title>vulnerable a LFI y RFI</title> </head> <body> <h1>bienvenido a este sitio</h1> <?php $Pagina = isset($_get[ Pagina'])? $_GET[ Pagina'] : 'index.html';?> <p>estás viendo la página: <?php echo"<a href='$pagina'>$pagina</a>";?></p> <?php include($pagina);?> </body> </html> Page Palo Alto Networks
32 Exploiting LFI vulnerabilities The page will read the file index.html if it doesn t receive any parameter over $pagina. Let s try now to inject another page into the system, creating a kind of Directory Traversal attack: Page Palo Alto Networks
33 Shell injection via RFI It s possible to exploit RFI vulnerabilities to get, among other stuff, a shell on the exploited server itself (this way we get a site that we can still use later to inject malware, for instance). For this purpose you can use shells encoded with html. There are many available with different features: b374k, c99, r57, locus, c100, All we need to do is exploit the same vulnerability, but as an RFI (Remote File Inclusion), including in the vulnerable parameter the path to a webshell code in another server. For instance: Page Palo Alto Networks
34 Exploiting RFI vulnerabilities - WebShell execution (locus) Page Palo Alto Networks
35 Exploiting RFI vulnerabilities - Getting a back shell Now we have many resources at our disposal. Each webshell offers its own integrated suite of tools. With locus we can for example get access to the system via CLI, through a reverse or back shell For this purpose we will use netcat in the attacker PC, listening in a TCP port where we will get the backshell. In this example we will use 6666: Then we launch the back connect in locus and we check what s going on in netcat Bingo!!! Now we could for instance try a privilege escalation, install a rootkit (later on in this PPT, in the client side),... Page Palo Alto Networks
36 Summary: Global flow The victim visits the URL and the drive-by download executes Hop Point Victim The victim downloads and installs the malware and becomes a part of the botnet The victim visits the site and is redirected to the malicious URL Popular websites(landing Site) Malware repository Attacker (y C&C) The attacker injects the URL, in a legitimate site preferably, under his control Page Palo Alto Networks
37 Countermeasures: Next Generation Firewall
38 Applications Get Through the Firewall Both internal and external applications are accessible through traditional firewalls... Page Palo Alto Networks.
39 Applications Get Through the Firewall and can carry inbound threats Page Palo Alto Networks.
40 Applications Get Through the Firewall and outbound risks Page Palo Alto Networks.
41 Applications Get Through the Firewall and are increasingly encrypted Page Palo Alto Networks.
42 Requirementes for a NGFW New requirements for the FW Identify the application Identify the users Scan the application Granular control and visibility Multi-Giga performance Page Palo Alto Networks.
43 Why Visibility & Control Must Be In The Firewall Application Control as an Add-on Traffic Firewall Port IPS Port-based FW + App Ctrl (IPS) = two policies Applications are threats; only block what you expressly look for Applications Implications Port Policy Decision App Ctrl Policy Decision Network access decision is made with no information Cannot safely enable applications NGFW Application Control Application control is in the firewall = single policy Visibility across all ports, for all traffic, all the time Implications Network access decision is made based on application identity Safely enable application usage Traffic Firewall Applications App Ctrl Policy Decision Application IPS Scan Application for Threats Page Palo Alto Networks.
44 Fighting Malware in the Cloud
45 The attacker has many opportunities Time needed to capture the first sample in the wild Time needed to create and verify the malware signature Total exposure time Time needed for updating the virus definitions With traditional signatures you can need weeks until the users are protected Page Palo Alto Networks.
46 Evolving Threats Require Intelligent Solutions An effective modern malware solution must provide: Visibility See files in all applications, protocols, and ports at all times See files inside SSL, compression, and encoding Visibility into mobile devices and users Detection & Reaction Sandbox-based behavioral analysis of new unknown files Rapid alerting of malware discovered on the network Complete forensics report of the activity of the malware Enforcement Automatic updates of signatures to block threats at the firewall True in-line blocking of infecting files and C&C traffic Stream-based malware blocking to preserve performance Page Palo Alto Networks.
47 Fighting Malware in the Cloud Centralized malware analysis in the cloud provides key advantages over on-premises solutions: All signatures are rapidly shared with devices globally No need to reprocess files already seen by other customer networks Rapid updating of detection logic (countering VM-aware malware) Cloud safely enables internet access to samples during analysis period No additional on-premises hardware required Page Palo Alto Networks. Proprietary and Confidential.
48 Architecture Uses two main technologies Virtual sandbox environment Malware signature generator Page Palo Alto Networks. Proprietary and Confidential.
49 Cloud Architecture File Submission Comparer Virtual Test Environment Cloud Automated Signature Generator Admin Web Portal Files Signatures Page Palo Alto Networks.
50 The Power of Combining Malware Protection and Application Control
51 Today s Focus: Evasive Traffic in Malware 1. Send malware or C2 traffic over commonly open ports - Use existing protocols in unexpected ways - Develop custom protocols that meet a specific need of the attacker 2. Use standard protocols over nonstandard ports to avoid signatures signatures Port 80 Port HTTP
52 Application Control for Malware Analysis Full stack visibility into all traffic Decodes and identifies traffic regardless of port or evasion Progressive analysis Decodes tunneled protocols and communications Identifies evasive techniques Encryption, proxies, anonymizers, circumventors Shows non-compliant or unknown traffic Not identified by decoders, signatures or heuristics
53 Evasive Traffic Observed in Malware Newly Detected Malware in Live Networks (April 2012) - Use of non-standard ports, dynamic DNS, use of proxies and custom traffic were most common techniques 16,497 Newly Discovered Malware Samples 66% 80% 59% Undetected by traditional AV vendors 13,256 samples generated Internet traffic Of those samples, 7,918 generated evasive traffic
54 Common Evasive Behaviors in Malware Surprisingly little use of IRC short h p headers unknown traffic ddns, fas lux domain fake h p nonstandard h p port irc on regular port irc on nonstandard port samples
55 Unknown traffic was both the most common and the most evasive x x samples (23%) generated unknown traffic or fake HTTP x x 2.3x 1.5x 3.0x 0 short h p headers unknown traffic ddns, fas lux domain fake h p nonstandard h p port irc on regular port irc on nonstandard port number of sessions number of samples
56 Opportunity to Manage the Unknowns Unknown traffic is found in significantly high rates in malware as opposed to valid network traffic 11% of malware sessions presented as unknown 0.6% of sessions of enterprise network traffic presents as unknown Based on data from Application Usage and Risk Report based on thousands of networks. Enterprises can progressively reduce the amount of unknown traffic Create custom App-IDs for internally developed or custom applications Shifts the odds in favor of IT over time Page 56
57 An Integrated Approach to Threat Prevention Applications Sources Known Threats Unknown Threats Visibility and control of all traffic, across all ports, all the time Control traffic sources and destinations based on risk Stop exploits, malware, spying tools, and dangerous files Automatically identify and block new and evolving threats R e d u c i n g R i s k Reduce the attack surface Control the threat vector Control the methods that threats use to hide Sites known to host malware Find traffic to command and control servers SSL decrypt high-risk sites Integrated threat prevention across exploits and malware Stream-based anti-malware based Control threats across any port Behavioral analysis of unknown files Visibility and automated management of unknown traffic Anomalous behaviors Page Palo Alto Networks.
58 References
59 References (some ) [1] OWASP Malicious file execution : [2] lionaneesh Understanding LFI & RFI attacks : [3] Pudja Mansyurin Web Shell (B374k, C99, R57) : r57.html [4] Wayne Huang Drivesploit: Circumventing Automated Detection of Browser Exploits (BlackHat USA 2010) [5] ESET Drive-by-Download: infección a través de sitios web [6] Microsoft Security Intelligence Report Volume 12 : [7] Lenguaje de programación AutoIT: Page Palo Alto Networks Slide 59
60 References (some ) [8] Satyamhax Practical RTLO Unicode Spoofing! : [9] BreakingPoint Javascript obfuscations : [10] F-Secure How we found the file that was used to hack RSA : [11] Wikipedia (Varios) [12] Symantec Zeus: King of crimeware toolkits : [13] Poison Ivy Remote Administration Tool : [14] Metasploit Penetration Testing Software : Page Palo Alto Networks Slide 60
61 Thanks for your attention!
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Palo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
FROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Next-Generation Firewall Overview
Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Next-Generation Firewall Overview
Next-Generation Firewall Overview Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional port-based firewalls
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
RETHINK SECURITY FOR UNKNOWN ATTACKS
1 Copyright 2012 Juniper Networks, Inc. www.juniper.net RETHINK SECURITY FOR UNKNOWN ATTACKS John McCreary Security Specialist, Juniper Networks AGENDA 1 2 3 Introduction 5 minutes Security Trends 5 minutes
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
The Peak of Chaos Shane D. Shook, PhD 10/31/2012
w h a c k e r n a v k n d n h m y a w h o? n r h p e n c n o s a n w s o v y i d u n n n r n m s r k d e a i k o w i r c d i o m u t w e t w s u t s i v i t c a Shane D. Shook, PhD 10/31/2012 Cyber Crime
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
2015 Miercom Next Generation Firewall Solution Testing: Performance, Compliance and Advantages
2015 Miercom Next Generation Firewall Solution Testing: Performance, Compliance and Advantages DR150406D December 2015 Miercom www.miercom.com Contents Executive Summary... 3 Next Generation Firewall...
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012
Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data Dave Shackleford February, 2012 Agenda Attacks We ve Seen Advanced Threats what s that mean? A Simple Example What can we
MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director
MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2 MALWARE ORIGINS Users bring it from home
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management
A Websense Brief By Patrick Murray, Senior Director of Product Management Advanced Persistent Threats: From FUD to Facts With Websense, you can stay a step ahead of the threats. From our roots in web filtering,
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Next-Generation Firewall Overview
Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any
How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 [email protected]
How Lastline Has Better Breach Detection Capabilities By David Strom December 2014 [email protected] The Internet is a nasty place, and getting nastier. Current breach detection products using traditional
May 2010. Palo Alto Networks 232 E. Java Drive Sunnyvale, CA 94089 408-738-7700 www.paloaltonetworks.com
Application Visibility and Control: In the Firewall vs. Next to the Firewall How Next-Generation Firewalls are Different From UTM and IPS-based Products May 2010 Palo Alto Networks 232 E. Java Drive Sunnyvale,
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Stop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
