Revealing and Analysing Modem Malware
|
|
|
- Lorena Nash
- 10 years ago
- Views:
Transcription
1 Revealing and Analysing Modem Malware Pavel Celeda Institute of Computer Science Masaryk University Botanicka 68a, Brno Radek Krejci CESNET, z.s.p.o. Zikova 4, Praha 6 [email protected] Vojtech Krmicek Faculty of Informatics Masaryk University Botanicka 68a, Brno [email protected] Abstract Malware targeting broadband s like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, we provide a formal description of modem malware life cycle. Furthermore, we propose a set of techniques to perform detailed analysis of modem and we provide the binary samples of modem malware at our web repository. Description of the modem malware evolution is also included. Based on our experiences with analysing and monitoring modem malware, we report on long-term statistics of modem malware activities in campus network including a discovery of new botnet. We propose NetFlow based method to reveal the modem malware spreading. Keywords-modem; malware; botnet; Linux; MIPSel; security; monitoring; network; NetFlow; ISP. I. INTRODUCTION End-users can protect their computers by many security tools and local networks can be protected by firewalls, intrusion and prevention systems. However, there is still a wide class of broadband s, as Asymmetric Digital Subscriber Line (ADSL) modems, with a lack of proper network protection. Cui et al. [1] found over 540,000 publicly accessible broadband s, including routers, wireless access points, modems or VoIP appliances, configured with factory default root passwords. Broadband s contain a lightweight version of regular operating system, e.g., a BusyBox [2]. Thus, such s are vulnerable to common malware and network attacks. Widely deployed and often misconfigured embedded s represent serious threat for end-users and even public and private sector. GNUCITIZEN.org reports on security issues of various embedded s. They demonstrated [3] that there is some kind of security flaw in almost every home electronic. The paper is organised as follows. After the Introduction, Section II presents an overview of evolution of malware exploiting broadband s and a formalisation of modem malware life cycle. Section III proposes a set of techniques and methods to perform a detailed analysis of the modem by malware. Section IV presents statistics from longterm monitoring of modem malware. Furthermore, description of malware spreading method based on such network traffic statistics is included. Conclusion summarise possible usage of techniques described in this paper. II. MODEM MALWARE PSYB0T was the first widespread malware directly targeting modems. It was discovered in 2009 by Australian security researcher Terry Baume [4]. PSYB0T profited from the fact that several revisions of the modem firmware was shipped with insecure web configuration interface available from the Internet. It means that no username or password was required to access the configuration interface. Remote access via SSH and TELNET was enabled with admin password. These flaws were fixed in later firmware revisions. PSYB0T came into awareness when it was labelled as an originator of the Distributed Denial of Service (DDoS) attack against DroneBL site [5] in March PSYB0T was a proof-of-concept botnet exploiting typical vulnerabilities and misconfigurations of the modems. It presented simple and efficient techniques how to exploit flaws of modem firmware to break into the modems. The botnet was shot down by the botmaster in late March In that time the size of the botnet was estimated about thousands of modems. Another example of the modem malware is dhpot. It appeared shortly after PSYB0T in early 2009 in time when PSYB0T was shot down. The worm executable contains a string The Distributed Honeypot Project. There is not much information about its activities [6]. dhpot spreads via TELNET service. We acquired a dhpot sample from an modem in March At that time the worm infrastructure was down. Some worm artifacts were randomly spreading through Internet using last distribution. Our dhpot analysis is based on binary file downloaded from the Trivial File Transfer Protocol (TFTP) (2rstt.mooo.com). Worm does not conduct any attacks. It is used to get information about modem, send it to the and spread itself to other s. dhpot detects a version of installed operating system, modem uptime, MAC address of the modem and its IP address. Acquired information together with login and password, used to break into the modem, are sent to the that collects worm statistical information. dhpot is the only observed modem malware which does not use Internet Relay Chat (IRC) and downloads files through FTP or TFTP protocols.
2 In December 2009 we have discovered previously unknown malware targeting modems. The Chuck Norris botnet [7] got its nickname from a comment in its source code [R]anger Killato : in nome di Chuck Norris!. The botnet was disclosed in February 2010 and the activity of the botnet s C&C centres was suspended on 22 February The estimated size of the botnet was over 30,000 s in that time. Ongoing presence of the Chuck Norris botnet was documented by Marco van Berkum [8] in November Description of this improved version can be found in [9]. list of A/B class prefixes to scan pnscan port 23 scan 1. list of possible s m, m-ran 2. wget telnet connection login: admin pass: admin web Algorithm 1 Modem Botnet Life Cycle 1. JOIN ##soldiers## 2. TOPIC:!* init-cmd (get scan-tools) C&C (IRC) 3. wget scan-tools web syslgd 3. stop remote access (ports 22-80) STOP pnscan 4. Internet syslgd attack command port 23 scan (phase 1) rary extension storage. RAM is erased on each reboot of the and rewritten by the firmware image from a persistent Non-Volatile Random Access Memory (NVRAM). Therefore a power cycling disinfects the modem although it does not prevent any future infection until a security configuration of the modem is changed. Functionality Division: Main tasks of the bots are usually performed by separated binaries. The first tool performs scanning of selected networks for other vulnerable modems and controls spreading via TELNET/SSH. The second tool (bot) communicates with the C&C centre and performs several harmful functions like various types of flood attacks or interprets instructions from the C&C centre as shell commands. Figure 1, describing Chuck Norris botnet life cycle, follows general scheme of modem malware life cycle described in Algorithm 1. As first operation after intrusion into the, bot tries to disable any connection to the configuration interfaces. Then, the botnet binaries are downloaded and up-to-date bot is launched. Finally, bot performs orders from C&C centre while other vulnerable s are searched for and. attack: TCP ACK flood TCP SYN flood UDP flood UDP non-spoofing flood C&C (IRC) Fig. 1. The Chuck Norris botnet life cycle: (1) scanning for vulnerable s in selected networks, (2) infection of a vulnerable, (3) bot initialisation, (4) further scanning for vulnerable s from a newly and waiting for attack commands. The life cycle of the Chuck Norris botnet can be divided into the four parts as shown in Figure 1. There can be seen some common characteristics typical for the most of modem malware: Simplicity: In comparison to for example fast flux or advanced anti-debugging techniques used by PC malware, modem malware use simple techniques as IRC communication or Ultimate Packer for executables (UPX) packaging [10]. Ease of Creation: Modem malware is often based on slightly modified Linux PC malware and cross-compiled for MIPSel hardware. There are publicly available malware source codes (Hydra [11], Kaiten [12]) that can be easily modified and used by any botmaster. Command and Control: Botmasters use exclusively IRC protocol to control their botnets from dedicated C&C s. Ease of Removing: Modem malware so far resists in a Random Access Memory (RAM) used by modems as tempo- P ORT := 23 {TELNET port} N ET S := predefined list of network prefixes CREDEN T IALS := login/password combinations M ODEM S := initially empty set of vulnerable modems BOT : daemonize() {go to background} IRCConnection := IRCConnect(C&C, IRC channel) while COM M AN D := receivecommand(ircconnection) do if COM M AN D == Quit then break; performcommand(com M AN D) end while BOT LIF ECY CLE: {Disable connections to a configuration interface(s)} system ( iptables -I INPUT 1 -p tcp dport P ORT -j DROP ) {Download bot executable file} wget /bot {Start./bot in background} BOT {Scan for vulnerable modems} for all N ET in N ET S do IP S := IP addresses based on N ET prefix for all IP in IP S do if testconnection (IP on PORT) == OK then M ODEM S := IP {add another vulnerable modem} {Try to break into vulnerable modems} for all M ODEM in M ODEM S do for all CREDEN T IAL in CREDEN T IALS do if login(m ODEM, P ORT, CREDEN T IAL) == OK then execute BOT LIF ECY CLE at M ODEM III. I NFECTED M ODEM A NALYSIS One approach to study malware is to perform analysis of the modem. Through this, we are able to observe botnet activities and it is possible to detect new C&C (s) and distribution site(s). This Section shows analysis which uses modem built-in commands and can be performed by any user.
3 A. Remote Access to Modem Administration Devices with enabled remote access via TELNET, SSH, or HTTP(S) are potentially vulnerable. To determine modem public IP address, check from your local network a website which provides you the IP information 1. To check remote access, use your actual IP address and type commands listed in example bellow. # telnet -l admin <<IP>> # ssh root@<<ip>> # curl # curl Alternatively, you can access your modem from local network using default IP address, usually Typically, the firewall policy for local network is less strict than for the Internet interface. In case you have established the connection, try default credentials 2 for your to log in. If you cannot connect, try to power cycle your to disinfect it before you check the access again. The malware often blocks connections to TCP ports to hide own activities. See Section III-C how to prevent blocking remote access. B. Modem Operating System BusyBox provides a fairly complete environment for any small or embedded system. It is a multi-call binary that combines many common Unix utilities into a single executable. Nowadays, the BusyBox is used in many Linux-based modems. Some of the s provide access to a shell as shown in example below. # busybox BusyBox v0.61.pre ( : ) multi-call binary Usage: busybox [function] [arguments]... or: [function] [arguments]... Currently defined functions: [, ash, busybox, cat, chgrp, chmod, chown, cp, date, dd, df, echo, false, free, grep, hostname, id, ifconfig, init, insmod, kill, ln, login, ls, lsmod, mkdir, modprobe, mount, mv, passwd, ping, ps, pwd, reboot, rm, rmmod, route, sh, sleep, sync, tar, test, tftp, touch, true, tty, umount, wget, whoami, yes Once the bot gains access to a modem, it will try to download malware via wget or other download programs like ftpget or tftp. Other used commands are sh, chmod, ln, mkdir, and rm. Generally, the modem file system [13] is read-only. To store files, the RAM-based file system mounted at /var must be used. Everything in /var will be lost on reboot. # ls -alf /var/* grep * -rwxrwxrwx Sep 29 15:35 hidr* -rwxr-xr-x Sep 28 22:00 mzn* -rwxr-xr-x Sep 29 21:58 scanzz* -rwxrwxrwx Sep 29 15:11 suka* -rwxr-xr-x Sep 28 11:22.z.sh* To hide malware presence, some bots add dot character in front of the name of the file or directory, e.g.,.scan, or they use... as a directory name. Other common technique is to remove stored binary files, once they are executed. Process information pseudo-file system still provides information about executed commands. /proc/*/exe shows process number of removed file. ps command provides further information about the running process, including command path. # ls -la /proc/*/exe grep var ls: /proc/7821/exe: No such file or directory /proc/2593/exe -> /var/tmp/suka ls: ls:/proc/2617/exe: No such file or directory /proc/2621/exe -> /var/tmp/mzn # ps PID Uid VmSize Stat Command 2621 root 636 S /var/tmp/mzn <- bot client!! 7821 root 644 S -bash <- bot client!! C. Modem Firewall The modem may be by several botnets simultaneously if the TELNET port remains open. Typically, the first malware operation after gaining access is to set IP table rule which will block remote connections to TCP ports # iptables -I INPUT 1 -p tcp --dport 22:80 \ -s! j DROP This will effectively block all attempts to remotely remove or analyse malware inside. To avoid such situation, a small shell daemon can be used to check firewall rules and reopen closed TELNET port. # ( while true; do \ iptables -nl INPUT --line-numbers \ grep 1 grep ACCEPT grep dpt:23 \ iptables -I INPUT 1 -p tcp --dport 23 -j ACCEPT;\ sleep 10; \ done ) & Connection tracking provides information about hosts trying to connect to the modem administration interface. It can be network discovery scans or TELNET brute force attacks. Resulting list of IP addresses can be used to traceback attack sources. # while true; do \ cat /proc/net/ip_conntrack grep dport=23 \ grep CLOSE ; sleep 2; echo -n.; \ done D. Memory Analysis Modems do not store any persistent logs which can provide used shell commands. Physical memory analysis is the only way how to determine information as malware commands, distribution sites, IRC messages, etc. Memory stores partial information even after the reboot. This way, malware artifacts can be extracted even from the dis s. The dd program can be used to capture the contents of physical memory using /dev/mem file. In the recent Linux kernels, /dev/mem is no longer available by default. On the other hand, all modems that we analysed provide /dev/mem. Following command will create image of physical memory and store it on a remote.
4 # dd if=/dev/mem bs=1m \ ssh user@ dd of=/tmp/mem-copy.bin The /proc/iomem shows the map of the system memory for each physical. This is important if the system RAM does not start at address 0. dd is not able to capture memory without correct offset (starting address). # cat /proc/iomem ffffff : reserved ffff : System RAM ffffff : System RAM cb7bf : Kernel code 141dc f7fff : Kernel data a a86107ff : eth0 We search for a wget pattern to extract botnet distribution sites from the current content of memory. # dd if=/dev/mem skip= bs=1 grep wget To extract botnet IRC communication from the actual contents of memory, we search for PRIVMSG or NOTICE strings used as IRC user commands. # dd if=/dev/mem skip= bs=1 grep PRIVMSG # dd if=/dev/mem skip= bs=1 grep NOTICE E. Malware Samples Malware samples can be downloaded from botnet distribution sites. What to do if they are down or the botmasters blocked access from malware researchers network? In such case, we must extract the malware samples from. The modem file upload possibilities are quite limited. We use hexdump to convert a binary file to hexadecimal dump which we copy from terminal output and convert them back to original file. # cat /var/.scan/m hexdump -v -e "\\\x" 1/1 "%02x" # echo -e -n " cat terminal_output_file " > m We maintain an archive 3 of modem malware samples for other malware researchers. The archive includes all modem malware binaries, we describe in this paper. IV. MALWARE NETWORK ACTIVITIES To protect our campus network, we have developed and deployed network monitoring system based on NetFlow information (see Figure 2). The network-based approach allows us to see all activities against and from our network. We use NetFlow [14] as an input for the security analyses and the anomaly systems we work on. Algorithm 2 describes the method to detect malware spreading. The use of the TELNET protocol should be discontinued for security related shortcomings and replaced by SSH protocol. Any TELNET activity, especially on the public Internet, is suspicious. TELNET is the main protocol used to break into insecure modems. Therefore, we focus on TELNET connections (TCP port 23). Other conditions to designate a certain IP address as an attacker are: 3 celeda/malware-samples/ standalone probes NetFlow supporting router (optional) NetFlow data generation NetFlow v5/v9 NetFlow collectors NetFlow data collection SPAM worm/virus intrusion NetFlow data analyses mail http syslog incident reporting CSIRT Fig. 2. Flow-based network security monitoring system. Generated NetFlow data are stored into NetFlow collectors and used for network forensics by university security team. 1) A particular flow contains TCP SYN flag only attacker only checks for opened TELNET port and do not send more than one packet to the host. 2) TCP SYN packet size is 60 bytes the flow length (corresponding to the single SYN packet in the flow) of 60 bytes is a fingerprint of Linux TCP/IP stack used in modems. Algorithm 2 Malware Spreading Detection F LOW S := observed flow information {Select suspicious IP addresses} for all F LOW in F LOW S do if F LOW.T CP.dstport == 23 then if SYN in F LOW.T CP.flags then if not ACK in F LOW.T CP.flags then if F LOW.Bytes == 60 then IP S.add(F LOW.IP.srcaddr) Here we provide a long term statistics acquired both from the campus network and from the single host outside the campus network. These statistics are based on the Algorithm 2. They were collected in the period from October 2009 till July 2011 and contain NetFlow data representing TELNET scans. This behaviour is typical for botnets targeting modems. Example of such malware is the Chuck Norris botnet, which was active in the watched period. Figures 3 and 4 show the number of total scans aggregated by days in different networks. We can see significantly larger number of scans targeting campus network. This is caused by the large address space covered by campus network, containing B class subnet instead of one particular IP address in the case of single host statistics. The number of scans performed by a single attacker corresponds also with this fact. In the case of campus network, each attacker performed 194 scans in average. It roughly corresponds to the horizontal scan exploring C class subnet of the campus network. In the case of host outside campus network, there was only one scan per attacker in average.
5 TELNET Scans per Day / / / / /07 Chuck Norris Botnet Suspended Chuck Norris Botnet Version 2 Campus Network Removed from Botnet Scanning List 2010/09 Date 2010/ / / / /07 Fig. 3. Number of TELNET scans campus network /16. TELNET Scans per Day Fig / / / / / / /04 Date 2010/ / / / /07 Number of TELNET scans single host outside campus network. Figure 3 illustrates how the bots stopped their activity after botnet disclosure. We released the botnet information to the security community including TF-CSIRT 4 in February Afterwards, the botmasters removed our campus network from their scanning lists. We can see significant decrease in number of scans in the second half of the year Later we have observed blocked access to the botnet distribution and C&C s from networks outside the set of networks scanned by bots. These way botnet owners try to reduce possibility of studying botnet by security experts. V. CONCLUSION As we have demonstrated in the Section IV, there is a high potential to detect suspicious network activity from the ISPs point of view. ISPs can start with instructions and best-practices for managing security situation in the network described in some Internet Engineering Task Force (IETF) documents [15], [16]. According to these documents, ISPs are supposed to use some combination of malware methods, like network/application traffic flow analysis or Intrusion Detection Systems (IDS), to protect their customers. In this paper, we have described several techniques to get as much as possible information about modem malware. With our experiences from analysing modem malware, we have shown a general characteristics and behaviour pattern of the current generation of the modem malware. Furthermore, we also provide a number of malware samples for other researchers. Acknowledgements This material is based upon work supported by the Czech Ministry of Defence under Contract No. SMO02008PR980- OVMASUN and also supported by the CESNET Large Infrastructure project LM funded by the Ministry of Education, Youth and Sports of the. REFERENCES [1] A. Cui and S. Stolfo, A quantitative analysis of the insecurity of embedded network s: Results of a wide-area scan, in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 10), New York, NY, USA, 2010, pp [2] E. Andersen. (2011) Busybox the swiss army knife of embedded linux. [Online]. Available: [3] GNUCITIZEN. (2008, Feb.) Router hacking challenge. [Online]. Available: [4] T. Baume. (2009) Psyb0t information page. [Online]. Available: [5] Nenolod. (2011) Network bluepill stealth router-based botnet has been ddosing dronebl for the last couple of weeks. [Online]. Available: [6] (2009, Mar.) Random attempts to hit port 23 (telnet). [Online]. Available: [7] P. Čeleda, R. Krejčí, J. Vykopal, and M. Drašar, Embedded malware an analysis of the chuck norris botnet, in Proceedings of the 2010 European Conference on Computer Network Defense, Los Alamitos, CA, USA, 2010, pp [8] M. Berkum. (2010, Nov.) Full disclosure mailing list archives ssh scans, i caught one. [Online]. Available: /Nov/228 [9] P. Čeleda and R. Krejčí, An analysis of the chuck norris botnet 2, Institute of Computer Science, Masaryk University, Brno, Tech. Rep., Mar [Online]. Available: files/cnb-2.pdf [10] M. Oberhumer, L. Molnár, and J. Reiser. (2011) UPX - the Ultimate Packer for executables. [11] (2008) Hydra Mass DDoS Tool. [Online]. Available: dlink-automatic/hydra zip [12] (2001, Dec.) kaiten.c irc ddos bot. [Online]. Available: http: //packetstormsecurity.org/irc/kaiten.c [13] P. Lougher. (2011) SQUASHFS - A squashed read-only filesystem for Linux. [14] B. Claise, Cisco systems netflow services export version 9, RFC 3954, Oct [Online]. Available: [15] J. Livingood, N. Moody, and M. O Reirdan, Recommendations for the remediation of bots in ISP networks, Internet- Draft, Sep [Online]. Available: draft-oreirdan-mody-bot-remediation [16] C. Chung, A. Kasyanov, J. Livingood, and N. Moody, Comcast s web notification system design, RFC 6108, Feb [Online]. Available: 4
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid
Reverse Engineering a Sophisticated DDoS Attack Bot Author: Zeev Ravid July 2015 Introduction In July 2015, Radware s Emergency Response Team (ERT) noticed a significant increased usage of the Tsunami
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
How To Monitor Attackers On A Network On A Computer Or Network On An Uniden Computer (For Free) (For A Limited Time) (Czechian) (Cybercrime) (Uk) (Cek) (Kolomot
Recent development of tools to monitor attackers Daniel Kouril, Jan Vykopal lastname @ics.muni.cz 43 rd TF-CSIRT meeting 18 September, 2014, Rome, Italy About C4e project Single point of contact in Czech
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
BF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
[ X OR DDoS T h r e a t A d v i sory] akamai.com
[ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Uncovering secret connections among attackers by using network theory and custom honeypots
Uncovering secret connections among attackers by using network theory and custom honeypots Pedram Hayati (PhD) Security Dimension (SecDim) [email protected] 28 May 2015 Tl;dr By using a number of custom
Network Security In Linux: Scanning and Hacking
Network Security In Linux: Scanning and Hacking Review Lex A lexical analyzer that tokenizes an input text. Yacc A parser that parses and acts based on defined grammar rules involving tokens. How to compile
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
SEAGATE BUSINESS NAS ACCESSING THE SHELL. February 1, 2014 by Jeroen Diel IT Nerdbox
SEAGATE BUSINESS NAS ACCESSING THE SHELL February 1, 2014 by Jeroen Diel IT Nerdbox P a g e 1 Table of Contents Introduction... 2 Technical specifications... 3 Gaining access to the shell... 4 Enable the
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Partek Flow Installation Guide
Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access
Selected Topics of IT Security (41.4456) Seminar description
Selected Topics of IT Security (41.4456) Seminar description Sebastian Abt, Frank Breitinger April 3, 2012 1 Introduction The lecture and accompanying seminar target at master-level students interested
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
How To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A
Contents 1. Introduction... 3 2. Embedded Security Solutions... 4 2.1 SSH Access... 4 2.2 Brutal SIP Flood... 4 2.3 SIP Register Limitation... 5 2.4 Guest calls... 5 3. Manually configure system to raise
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Firewalls. Chien-Chung Shen [email protected]
Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Monitoring Netflow with NFsen
Monitoring Netflow with NFsen Network Monitoring and Management Contents 1 Introduction 1 1.1 Goals................................. 1 1.2 Notes................................. 1 2 Export flows from a
Common Services Platform Collector 2.5 Quick Start Guide
Common Services Platform Collector 2.5 Quick Start Guide September 18, 2015 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com CSP-C Quick
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
How to protect your home/office network?
How to protect your home/office network? Using IPTables and Building a Firewall - Background, Motivation and Concepts Adir Abraham [email protected] Do you think that you are alone, connected from
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Load Balancing Clearswift Secure Web Gateway
Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
School of Information Science (IS 2935 Introduction to Computer Security, 2003)
Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
CCNA 2 Chapter 5. Managing Cisco IOS Software
1 CCNA 2 Chapter 5 Managing Cisco IOS Software The default source for Cisco IOS Software depends on the hardware platform; most commonly, though, the router looks to the configuration commands that are
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. Email ID: [email protected]. My Blog: http://r00tsec.blogspot.com
Author: Sumedt Jitpukdebodin Organization: ACIS i-secure Email ID: [email protected] My Blog: http://r00tsec.blogspot.com Penetration Testing Linux with brute force Tool. Sometimes I have the job to penetration
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device
Ch.9 Firewalls and Intrusion Prevention Systems Firewalls: effective means of protecting LANs Internet connectivity is essential for every organization and individuals introduces threats from the Internet
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
