7.7 DDoS : Unknown Secrets and Botnet Counter-Attack. sionics & kaientt
|
|
|
- Conrad Norris
- 9 years ago
- Views:
Transcription
1 7.7 DDoS : Unknown Secrets and Botnet Counter-Attack sionics & kaientt
2 Contents Overview Botnet Structure 7.7 DDoS Bot Malware Analysis Botnet Counter-Attack Demo
3 Overview 7.7 DDoS Attack Cyber attack against major government, news media, and financial websites of South Korea and US
4 Re-Collection Server C&C Master Server hacked Web Hard sites (spreading malware) C&C IP Relay Server IP Relay Distributed C&C Server DDoS Target Websites DDoS Attack Zombie Bot Distributed Support Server (HDD Destroy Malware) Attacker flash.gif Main Support Server (HDD Destroy Malware)
5 Botnet Begins! Encryption Protocol Filename Port X Y send: + 0x28) ^ 0x47 recv: ^ 0x47) - 0x28 send: ^ 0x92) + 0x61 recv: - 0x61) ^ 0x92 dvcmgmt.exe 131 ntdsbcli.exe 143 ntdcmgt.exe 339 inetsvc.exe 112, 125, 133 perfmon.exe 112, 125, 133 tasksc.exe 128, 125, 133 A B C Encryption Protocol XOR 0xCC XOR 0xFC XOR Ramdom 8 Bytes C&C Master Server??? ntmssvc.exe??? Re-Collection Server????????? Distributed C&C Server netlmgr.exe ntmpcsvc.exe??? : : :443 C&C IP Relay Server : : : : : :80
6 Botnet Begins!
7 Structure of Botnet Composed in hierarchical structure C&C Server was operated as a distributed server by more than thousands of units through hacking. Re-Collection Server C&C Master Server C&C IP Relay Server IP Relay Distributed C&C Server
8 File Information Stealing Malware The hackers first circulated malwares that collect file information beforehand. These are estimated to have been circulated through various ways. The malwares collected information about the files that exist in the directories such as Recent, My Documents, Favorites and etc. from Victim s PCs and sent it to the C&C Server.
9 3 Types of Malware A B C Encryption Protocol XOR 0xCC XOR 0xFC XOR Ramdom 8 Bytes DDoS Malware (July ~) Beginning msiexec?.exe (= ntdll.exe) wimgat.exe dhcp32.exe (= ntdll.exe) C&C IP Relay Server Information msiexec?.exe (= ntdll.exe) wimgat.exe vol32.css DDoS wmiconf.dll ntscfg.dll perfvwr.dll Config File pxdrv.nls atv04nt5.img svrms.nls Spam HDD MBR Destroy wmcfg.exe mstimer.dll wversion.exe File Information Stealing Malware (May ~) netlmgr.dll ntmpsvc.dll ssdpupd.dll sysvmd.dll (early: sysenv.dll) regscm.dll (early: rasmcv.dll) Config File perfb093.dat drmkf.inf maus.dl
10 msiexec?.exe (= ntdll.exe) Checks c_10986.nls file Drops file and decompresses (inflate) Creates Service called WmiConfig Communicates with C&C IP Relay Server and creates pxdrv.nls file Removes the previous version of the services and config files
11 일부 자료 삭제
12 Dropping and inflating file Bot Malware Analysis
13 일부 자료 삭제
14 Communication Protocol with C&C IP Relay Server
15
16
17 pxdrv.nls file format
18 wmiconf.dll decodes pxdrv.nls file connects Distributed C&C Server and receives 10 Distributed C&C Server IP receives the file(~cgf????.tmp) after sending the time(saved in pxdrv.nls) parses the received file and executes reads attack targets in uregvs.nls, and starts DDoS attack
19 일부 자료 삭제
20 Communication Protocol with Distributed C&C Server
21
22
23
24 ~CGF????.tmp file format A : Compare Time B : Command Code1 C : Start Time D : End Time E : Command Code2 F : File Size G : File Data
25 uregvs.nls file format Bot Malware Analysis
26 uregvs.nls file format A : Unknown time B : Total Target URL Count C : URL number D : Target URL E : Resolved IP address F : Total resolved IP address Count G : Target Port H : Exponent MAX NUM count I : Modular value J : Time of starting the attack K : Time of ending the attack L : Related Query Performance Counter value M : Sleep term (between target) N : Total thread count per Target URL O : Related http connection time P : R's length Q : Allocated memory address of R R : Target URL; Port; Attack Type(get, post); Request path;;
27 DDoS Packet Type 일부 자료 삭제
28 DDoS Attack Packet Type and Order circling "packet per thread Source IP Destination IP Attack Type ETC 1 Orginal Target SYN 2 Spoofing Target SYN 3 Original Target ACK 4 Spoofing Target ACK 5 Original Target UDP 6 Spoofing Target UDP 7 Original Target ICMP 8 Spoofing Target ICMP 9 Target Broadcast ICMP smurfing 10 Original Target HTTP GET User-Agent Random(5) 11 Original Target HTTP GET User-Agent Random(5) Cache-Control
29
30 일부 자료 삭제
31 일부 자료 삭제
32
33 wmcfg.exe wmcfg.exe is executed only when the msvcr90.dll (Microsoft C Runtime Library) file exists. drops the following files: %System%\config\SERVICES %System%\config\SERVICES.LOG %System%\mstimer.dll %System%\wversion.exe starts the following service: mstimer deletes itself
34 mstimer.dll decodes SERVICES.LOG file attempts to connect the 8 Distributed Support Servers randomly and requests the flash.gif file
35 mstimer.dll sends the binary at the front part of flash.gif through spam mails to other users. However, because the binary is damaged file, the users who received the spam mails don t suffer from any damages substantially.
36 flash.gif file format
37 ~AX?.tmp executed by mstimer.dll drops the following file: wversion.exe (HDD MBR Destroyer) records the time of execution for wversion.exe in win.ini deletes itself
38 wversion.exe (HDD MBR Destroyer) executed by mstimer.dll after midnight on July 10. initializes the HDD MBR by 0x55 and inserts the string, "Memory of the Independence Day" In addition, in the case of the following extension, it makes the file unavailable by setting a random password and compressing into gz. (zip, pas, c, cpp, java, jsp, aspx, asp, php, rar, gho, alz, xml, pst, eml, kwp, gul, hna, hwp, txt, rtf, dbf, db, accdb, pdf, pptx, ppt, mdb, xlsx, xls, wri, wpx, wpd, docm, docx, doc) deletes itself
39
40 Botnet Counter-Attack
41 Botnet Counter-Attack
42 Botnet Counter-Attack
43 Botnet Counter-Attack
44 Demo It's Showtime!
45 Q & A Questions? contact us via sionics 0x40 issuemakerslab.com kaientt 0x40 issuemakerslab.com
46
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
DDoS Attacks & Defenses
DDoS Attacks & Defenses DDOS(1/2) Distributed Denial of Service (DDoS) attacks form a significant security threat making networked systems unavailable by flooding with useless traffic using large numbers
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
DDoS Attacks & Mitigation
DDoS Attacks & Mitigation Sang Young Security Consultant [email protected] 1 DoS Attack DoS & DDoS an attack render a target unusable by legitimate users DDoS Attack launch the DoS attacks from various
Inside the Storm: Protocols and Encryption of the Storm Botnet
Inside the Storm: Protocols and Encryption of the Storm Botnet Joe Stewart, GCIH Director of Malware Research, SecureWorks To be covered in this talk: Quick-and-dirty unpacking of Storm Structure of the
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Introduction. Two levels of security vulnerabilities:
Introduction Two levels of security vulnerabilities: Project level (cyphers, standard protocols, BAN logic, etc.) Implementation level (bugs, unhandled inputs, misconfigurations, etc.) There are two levels
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
How to create an Email
How to create an Email Don't share mail You can set the mailbox not to be shared individually. The first thing to do after launching the Send mail screen is to select whether to share or not to share the
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015. Black market of cybercrime in Russia
D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M 2015 Black market of cybercrime in Russia WHOAMI Information Security Manager (Russia and CIS) Information Security Officer Information Security
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania Email {amaximciuc, cvatamanu, rbenchea}@ bitdefender.com
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Korea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
Protect your network: planning for (DDoS), Distributed Denial of Service attacks
Protect your network: planning for (DDoS), Distributed Denial of Service attacks Nov 19, 2015 2015 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product
Network attack and defense
Network attack and defense CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan 1 Outline 1. Overview
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Phone.com. Communicate Better
1 Communicate Better - 1 / 16 - 2 Faxes Setting a Number to Receive Faxes Fax Notification Email Notification Text Message (SMS) notification Managing Faxes Viewing a Fax Downloading a Fax Viewing a Fax
v2.0 Document Server v2.0 v2.0 v2.0 advanced document sharing platform robust document management user-friendly administration SOFTWARE SOLUTIONS
Document Server advanced document sharing platform robust document management user-friendly administration SOFTWARE SOLUTIONS imageware Document Server A simple yet powerful advanced document sharing solution.
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
document sharing platform advanced document management user-friendly administration SOFTWARE SOLUTIONS
document sharing platform advanced document management user-friendly administration SOFTWARE SOLUTIONS imageware Document Server A simple yet powerful document sharing solution. An essentially better way
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h
Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab
DDoS Protecion Total AnnihilationD A Industry body formed to foster synergy among stakeholders to promote advancement in DDoS defense knowledge. Independent academic R&D division of Nexusguard building
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
For IT Infrastructure, Mobile and Cloud Computing - Why and how
For IT Infrastructure, Mobile and Cloud Computing - Why and how Will you fear me... First, who is this group called Anonymous? Put simply, it is an international cabal of criminal hackers dating back to
IDS and Penetration Testing Lab IIIa
IDS and Penetration Testing Lab IIIa Dissecting a Botnet C&C - rbot Triggering Lab Malware operation Upon execution malware connects to botirc.net server and establishes standard IRC session with #test
CARA v3.5 Sept 2013 Major new features. Set your users free
CARA v3.5 Sept 2013 Major new features Set your users free What is CARA CARA is an ergonomically designed, fast, web user interface and business rules engine, currently released for the following platforms:
Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding
Firewalls slide 1 configuring a sophisticated GNU/Linux firewall involves understanding iptables iptables is a package which interfaces to the Linux kernel and configures various rules for allowing packets
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Chinese Chicken: Multiplatform DDoS botnets
Chinese Chicken: Multiplatform DDoS botnets Peter Kálnai @pkalnai Jaromír Hořejší @JaromirHorejsi Dec 3 nd Dec 5 th 2014 Nancy, France Outline Timeline (+References) Binaries, common characteristics Advertisements
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
A perspective to incident response or another set of recommendations for malware authors
A perspective to incident response or another set of recommendations for malware authors Alexandre Dulaunoy - TLP:WHITE [email protected] June 7, 2013 CIRCL, national CERT of Luxembourg CIRCL
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
Using the Trash to Restore Files and Folders. Recovering Items. Accessing the Trash
Using the Trash to Restore Files and Folders Box features a Trash, that allows you to recover files and folders that have been deleted. By default, all deleted items will be moved the Trash location of
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. [email protected] Intranet Security Components Network Admission Control (NAC)
Targeted(Attacks(Against( Civil(Society(in(Asia. Or(why(you(should(check(the(md5( before(opening(this(deck.
Targeted(Attacks(Against( Civil(Society(in(Asia Or(why(you(should(check(the(md5( before(opening(this(deck. Katie&Kleemola Citizen'Lab,'Munk School'of'Global'Affairs,' University'of'Toronto [email protected]
CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing
Introduction to ServerIron ADX Application Switching and Load Balancing Student Guide Revision : Introduction to ServerIron ADX Application Switching and Load Balancing Corporate Headquarters - San
IptabLes/IptabLex DDoS Bots
IptabLes/IptabLex DDoS Bots TLP - GREEN GSI ID: 1077 Risk Factor - High OVERVIEW During Q2 2014, Akamai s Prolexic Security Engineering and Research Team (PLXsert) detected and measured distributed denial
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
How To Attack A Website With An Asymmetric Attack
DEFENDING AGAINST LOW-BANDWIDTH, ASYMMETRIC DENIAL-OF-SERVICE ATTACKS David W. Holmes (@dholmesf5) F5 Networks Session ID: HT-R02 Session Classification: Intermediate AGENDA Introduction Why does this
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Denial of Service (DoS)
Intrusion Detection, Denial of Service (DoS) Prepared By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT), Amman s campus-2006 Denial of Service (DoS) What is DoS
BlackEnergy DDoS Bot Analysis
BlackEnergy DDoS Bot Analysis Jose Nazario, Ph.D. [email protected] Arbor Networks October 2007 Summary BlackEnergy is an HTTP-based botnet used primarily for DDoS attacks. Unlike most common bots, this bot
SIM Configuration Guide. February 2015 Version 1 Document Reference: 8127
SIM Configuration Guide February 2015 Version 1 Document Reference: 8127 Contents 1 SIM APN Settings... 3 2 SIM MMS Settings... 3 3 SIM Email Settings... 4 4 SIM SMS Settings... 5 5 SIM SMS Charging...
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Why to talk about Botnets
Botnets 1 Why to talk about Botnets Botnet could be a most powerful supercomputer in the world [1]. Recent attack on Estonia. Vehicle for cyber-terrorism and cyber crime. Very serious security threat that
Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business
& Preventing (Distributed Denial of Service) A Report For Small Business According to a study by Verizon and the FBI published in 2011, 60% of data breaches are inflicted upon small organizations! Copyright
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Latest update 17/12/2015
TECHNICAL DOCUMENT Reference Nr. Written by 20151211/CI/2 Costas Ioannou Latest update 17/12/2015 F-SECURE CONFIGURATION BEST PRACTICE AGAINST ZERO-HOUR MALWARE F-SECURE CLIENT SECURITY (CS) F-SECURE SERVER
Cullen Jennings [email protected]. July 2015
Cullen Jennings [email protected] July 2015 v9 1 A B 1. Outbound STUN request to well known STUN port (3478) Firewall creates 3-tuple pinhole for incoming and outgoing STUN message with matching username
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
