Peeling The Layers Of Vawtrak

Size: px
Start display at page:

Download "Peeling The Layers Of Vawtrak"

Transcription

1 Peeling The Layers Of Vawtrak October 20-21, 2015 Raul Alvarez Copyright Fortinet Inc. All rights reserved.

2 About Me

3 About Me Senior Security Fortinet 21 published articles in Virus Bulletin Regular contributor in our company blog 3

4 Agenda

5 Agenda Ø Ø Ø Vawtrak and Tor DGA Tor Tor2Web Vawtrak and its Layers Different features Different layers Multiple armoring strategies within the layers Vawtrak and Volatility Using Volatility Malware as a platform 5

6 Banking Malware

7 Banking Malware and C&C Binary updates/enhancements Operational commands Storage of stolen banking credentials Latest configuration 7

8 Banking Malware Protection Strategy Binary armoring to avoid detection Continuous monitoring of AV detection Using DGA to minimize takedowns Hiding its C&C via Tor 8

9 Vawtrak

10 What is Vawtrak? Also known as Neverquest A banking trojan Uses layering techniques similar to a Matryoshka doll Uses multiple armoring strategies Uses DGA Uses Tor2web 10

11 Vawtrak and Tor

12 DGA Hiding is not enough

13 DGA Ø Ø Ø Ø Ø DGA Domain name Generation Algorithm Also called PrDGA (Pseudo-random DGA) Generates a binary seed Can be a constant value Can be generated from the current time and date Generates a string of random alpha-numeric characters Adds a variation of TLDs, such as com, org, info 13

14 How DGA works Ø Ø Ø Ø Ø Client-side and Server-side uses the same algorithm The server-side registers one or more generated domain names The client-side tries all possible combination of generated domain names The client-side establishes connection to the server-side The server-side un-registers the registered domain to avoid detection 14

15 C&C

16 C&C Not a fixed string Derived from a DWORD value Controlled by 40-byte XOR key Different variants, different domains 16

17 Vawtrak s DGA seed byte generator alphanumeric generator 17

18 Different variants, different domains sample #1 18

19 Different variants, different domains sample #2 19

20 Different variants, different domains sample #3 20

21 Different variants, different domains sample #4 21

22 Tor2Web C&C

23 Vawtrak s DGA 23

24 Tor2Web C&C sample #2 24

25 Tor2Web C&C sample #4 25

26 How Tor Works

27 How Tor Works Image taken from torproject.org 27

28 How Tor Works Image taken from torproject.org 28

29 How Tor Works Image taken from torproject.org 29

30 Tor and Hidden Services

31 Hidden Service: Deep Web Radio 31

32 Hidden Service: Electronic Store 32

33 Hidden Service: Online News 33

34 Hidden Service: Free 34

35 Hidden Service: File Storage 35

36 Hidden Service: Tor Supermarket 36

37 Hidden Service: Chat Rooms 37

38 Hidden Service: The Hidden Wiki 38

39 And so much more q q q q q q q q q q /Messaging Books Financial Audio/Music Domain/Hosting Security Blogs Social networks Forums And so much more 39

40 Tor2Web

41 Tor2Web Ø Browsing hidden services via a normal web browser 41

42 Tor2Web Ø Header page 42

43 Can Vawtrak really use DGA to create a randomized Tor C&Cs?

44 Tor2Web C&C Pre-set.onion domains Pseudorandom DGA will not work Tor2Web C&C is not so random 44

45 Tor2Web C&C sample #2 45

46 Tor2Web C&C otsxxxxgxbcwvrqs 4bpxxxxz4e7n6gnb bc3xxxxf4m3lnw4o sample #4 46

47 Vawtrak and its Layers

48 Armoring Strategies Within The Layers Anti-Emulator Anti-Debugger Anti-Analysis Encryption/ Decryption Garbage Collection Hashing Compression/ Decompression Code injection 48

49 Layers of Vawtrak Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 49

50 Layer 1: Anti-Emulator Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 50

51 Layer 1: Anti-Emulator Hundreds of assembly language instruction 0x00 ADD BYTE PTR DS:[eax],al 51

52 Layer 1: Anti-Debugger Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 52

53 Layer 1: Anti-Debugger PEB(Process Environment Block) BeingDebugged ImageBase FFFFFFFF SpareBool Mutant Stage 1 Stage 2 53

54 Layer 1: Anti-Analysis Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 54

55 Layer 1: Anti-Analysis CreateFileA API using RETN 55

56 Layer 1: Decryption Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 56

57 Layer 1: Decryption filename Layer 2 executable file decoy file 57

58 Layer 2: Decryption + Garbage Collection Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 58

59 Layer 2: Decryption + Garbage Collection garbage code relevant code decryption algorithm decrypted/compressed executable 59

60 Layer 2: Decompression Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 60

61 Layer 2: Decompression RtlDecompressBuffer RtlDecompressBuffer( 0x102,0x1744e8, 0x30e00, 0x1436d0, 0x2F9AE, 0x12fcc4) Syntax: NTSTATUS RtlDecompressBuffer( _In_ USHORT CompressionFormat, _Out_ PUCHAR UncompressedBuffer, _In_ ULONG UncompressedBufferSize, _In_ PUCHAR CompressedBuffer, _In_ ULONG CompressedBufferSize, _Out_ PULONG FinalUncompressedSize ); compressed decompressed 61

62 Layer 2: Self-code Injection Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 62

63 Layer 2: Self-code Injection Steps: 1. Allocates new memory(0x8a0000) 2. Copies the decompressed Layer 3 to 0x8a Zeroes out the original location(0x400000) of Layer 2 4. Copies Layer 3 from 0x8a0000 to 0x Fixes IAT of Layer 3 in 0x Executes Layer 3 63

64 Layer 3: Anti-antimalware Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 64

65 Layer 3: Anti-antimalware 1. Traverses the following folders: Program Files Program Files (x86) %AppData% 2. Creates hash value for the antimalware pathname 3. Creates registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows \Safer\CodeIdentifi ers\0\paths\[hash value] SaferFlags = 0 ItemData = pathname 65

66 Layer 3: Anti-antimalware 66

67 Layer 3: Generating Layer 4 Layer 1 Anti-Emulator Anti-Debugger Anti-Analysis decryption decoy Layer 2 (encrypted) overlay decryption garbage collection Layer 3 decrypted + compressed Layer 2 Decompression RtlDecompressBuffer Layer 3 decompressed Self-code Injection Anti-Antimalware Layer 3 resource section hashing for validity decryption Layer 4 Layer 2 67

68 Layer 3: Generating Layer 4 1. Copies RT_RCDATA from.rscr section to the heap memory 2. Calculates the hash (0x24D2EDEA) of the raw data 3. Decrypts the raw data 4. Calculates the hash(0x ) of the decrypted data(dll) 5. Creates random filename +.dat 6. Copies the decrypted data from heap memory to newly created file (Layer 4) 7. Creates new startup registry key for Layer 4(DLL) 68

69 Demo

70

71 Decoy File 71

72 Vawtrak and Volatility

73 Volatility 73

74 psxview c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem psxview Volatility Foundation Volatility Framework 2.4 Offset(P) Name PID pslist psscan thrdproc pspcid csrss session deskth x01b8db28 mainout-crypted 224 True True True True True True True 0x019d4c90 cmd.exe 1420 True True True True True True True 0x01aa01d8 lsass.exe 680 True True True True True True True 0x wscntfy.exe 1672 True True True True True True True 0x0193c8d8 jusched.exe 1832 True True True True True True True 0x018ebda0 winlogon.exe 624 True True True True True True True 0x01aa4a28 svchost.exe 1208 True True True True True True True 0x01aaada0 svchost.exe 1044 True True True True True True True 0x018deac0 explorer.exe 1692 True True True True True True True <<cut>> 74

75 malfind c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem malfind -p 224 Volatility Foundation Volatility Framework 2.4 Process: mainout-crypted Pid: 224 Address: 0x Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE Flags: CommitCharge: 1, MemCommit: 1, PrivateMemory: 1, Protection: 6 0x ec b ac USWV...$... 0x c d c fc...$...$. 0x c e f...f..$... 0x e c b 8c n..$8...$8 0x x x x x ec x89000a 8b8424ac x c78424d x89001c c78424fc x c784249e f6e 0x c x89003c 8b 0x89003d 8c2438 PUSH EBP PUSH EBX PUSH EDI PUSH ESI SUB ESP, 0x198 MOV EAX, [ESP+0x1ac] MOV DWORD [ESP+0xd4], 0x0 MOV DWORD [ESP+0xfc], 0x0 MOV WORD [ESP+0x9e], 0x6e0f MOV DWORD [ESP+0x138], 0x1 DB 0x8b MOV [EAX+EDI], FS 75

76 yarascan c:\v24 --profile=winxpsp2x86 -f vawtrak.vmem yarascan -p yara-rules="mz Rule: r1 Owner: Process mainout-crypted Pid 224 0x77dd0000 4d 5a ff ff MZ... 0x77dd0010 b x77dd x77dd f x77dd0040 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x77dd f d e 6e 6f is.program.canno 0x77dd e e f t.be.run.in.dos. 0x77dd0070 6d 6f e 0d 0d 0a mode...$... 0x77dd0080 a8 6a e2 68 ec 0b 8c 3b ec 0b 8c 3b ec 0b 8c 3b.j.h...;...;...; 0x77dd0090 2f 04 d1 3b eb 0b 8c 3b 2f b e1 0b 8c 3b /..;...;/..;...; 0x77dd00a0 3d 07 d3 3b ee 0b 8c 3b ec 0b 8d 3b 54 0a 8c 3b =..;...;...;T..; 0x77dd00b0 2f 04 d0 3b ed 0b 8c 3b 2f 04 d2 3b ed 0b 8c 3b /..;...;/..;...; 0x77dd00c0 2f 04 ec 3b f1 0b 8c 3b 2f 04 d3 3b 7e 0b 8c 3b /..;...;/..;~..; 0x77dd00d0 2f 04 d6 3b ed 0b 8c 3b ec 0b 8c 3b /..;...;Rich...; 0x77dd00e x77dd00f c PE..L...q..I... Rule: r1 Owner: Process mainout-crypted Pid 224 0x77de8218 4d 5a 75 1d 8b 48 3c 8d b da d2 0x77de c f 94 c2 8b c2 5b 5d c2 04.<.PE...[].. 0x77de c0 eb f d 5a MZ... <<next slide>> 76

77 yarascan <<continuation>> 0x77de8248 8b ff 55 8b ec 51 8b f b 0x77de8258 7d fc f d 45 0x77de ff 75 0c ff 15 a8 11 dd f8 0x77de8278 ff f f x77de a ff 75 0c ff 15 0c 12 dd 77 8b d8 0x77de8298 3b de a ff dd 77 0x77de82a ff dd b 0x77de82b b 45 fc 5f 5e 5b c9 c2 0c x77de82c a a ff 75 0x77de82d8 0c ff dd 77 8b d8 83 fb ff ff 75 0x77de82e a 02 e8 57 ff ff ff fc ff x77de82f8 10 dd 77 eb bf ff dd 77 e9 e x77de b ff 55 8b ec 81 ec Rule: r1 Owner: Process mainout-crypted Pid 224 0x77de8240 4d 5a b ff 55 8b ec 51 8b 45 0x77de f b 7d fc x77de8260 0f d ff 75 0c x77de8270 ff 15 a8 11 dd f8 ff f x77de f a ff 75 0c 0x77de8290 ff 15 0c 12 dd 77 8b d8 3b de a 0x77de82a ff dd ff x77de82b0 dd b b 45 fc 5f 0x77de82c0 5e 5b c9 c2 0c a a..U..Q.E.SV3.HW. }..u.tgh..y...e.p.u..u...w....e.t.9u...y...v VVj.V.u...w.. ;.tavvvj.s...w S.G...4..w9w.tF. E...E._^[...Vh...j.Vj.h...u...w...t..u.Sj..W...S.E...4..w...T..w......U...P... MZ...U..Q.E.SV3.HW.}..u.tgH..Y...E.P.u..u....w...E.t.9u...Y...VVVj.V.u....w..;.taVVVj.S...wS.G...4..w9w.tF.E...E._ ^[...Vh...j.Vj 77

78 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x d 5a ff ff MZ... 0x b x x e x e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x f d e 6e 6f is.program.canno 0x e e f t.be.run.in.dos. 0x d 6f e 0d 0d 0a mode...$... 0x f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x004000a0 1f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x004000b c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x004000c c9 17 0e b9 c e b9 c9 yx$...rich... 0x004000d x004000e c PE..L... 0x004000f0 6e 22 2c e n",r... 78

79 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x001436d3 4d 5a ff ff MZ x001436e3 b d e8 00 0c 0e 0x001436f3 00 ba 0e 00 b4 09 cd 21 b c cd !...L.!Th 0x f d e is..program..can 0x e 6f e e 20 not..be.run.i.n. 0x f d 6f e 0d 0d 0a DOS.mo.de...$.. 0x f d7 9a 16 0e b9 c f 76 2c c9.ro...a...v,. 0x b f 2a c9 1b 02 0f b8 c9 4a 11...*...J. 0x f yx...yx#..'yx$ 0x ab c..Ric.h.3..PE..L 0x e 22 2c e b...n",R... 0x a e e 10...B..F...~. 0x b 05 cc x001437a a 00 9a f4 5f c7 02 0f 81...`..._... 0x001437b c c...A..h\... 0x001437c c d E.P... 79

80 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x001744e8 4d 5a ff ff MZ... 0x001744f8 b x x e x e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x f d e 6e 6f is.program.canno 0x e e f t.be.run.in.dos. 0x d 6f e 0d 0d 0a mode...$... 0x f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x001745a c9 17 0e b9 c e b9 c9 yx$...rich... 0x001745b x001745c c PE..L... 0x001745d8 6e 22 2c e n",r... 80

81 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x008a0000 4d 5a ff ff MZ... 0x008a0010 b x008a x008a e x008a0040 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x008a f d e 6e 6f is.program.canno 0x008a e e f t.be.run.in.dos. 0x008a0070 6d 6f e 0d 0d 0a mode...$... 0x008a f d7 9a 16 0e b9 c9 16 0e b9 c9 16 0e b9 c9 Ro... 0x008a0090 1f 76 2c c9 17 0e b9 c9 16 0e b9 c9 15 0e b9 c9.v,... 0x008a00a0 1f 76 2a c9 1b 0e b9 c9 16 0e b8 c9 4a 0e b9 c9.v*...j... 0x008a00b c9 1b 0e b9 c c9 17 0e b9 c9 yx...yx#... 0x008a00c c9 17 0e b9 c e b9 c9 yx$...rich... 0x008a00d x008a00e c PE..L... 0x008a00f0 6e 22 2c e n",r... 81

82 yarascan Rule: r1 Owner: Process mainout-crypted Pid 224 0x00aaa668 4d 5a ff ff MZ... 0x00aaa678 b x00aaa x00aaa d x00aaa6a8 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd !..L.!Th 0x00aaa6b f d e 6e 6f is.program.canno 0x00aaa6c e e f t.be.run.in.dos. 0x00aaa6d8 6d 6f e 0d 0d 0a mode...$... 0x00aaa6e8 8b e6 cf f4 67 b5 cf f4 67 b5 cf f4 67 b5...g...g...g. 0x00aaa6f8 3e 32 a8 b5 d6 f4 67 b5 3e 32 aa b5 c4 f4 67 b5 >2...g.>2...g. 0x00aaa708 3e 32 a9 b5 95 f4 67 b5 c6 8c f4 b5 ca f4 67 b5 >2...g...g. 0x00aaa718 cf f4 66 b5 9c f4 67 b5 54 1f a8 b5 cd f4 67 b5..f...g.t...g. 0x00aaa f ae b5 ce f4 67 b5 54 1f ab b5 ce f4 67 b5 T...g.T...g. 0x00aaa cf f4 67 b c Rich..g.PE..L... 0x00aaa e1 2d e B.-R...! 0x00aaa758 0b

83 yarascan Libraries (DLL) loaded in the memory also have the MZ header. 83

84 Malware As A Platform

85 Malware As A Platform vawtrak vawtrak mainoutcrypted-5.exe decompressed executable encrypted overlay decrypted overlay compressed exe decompressed executable decompressed executable Diana-23.jpg mainoutcrypted-5.exe resource section payload executable 85

86

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,

More information

Fighting malware on your own

Fighting malware on your own Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared

More information

TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com

TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com TitanMist: Your First Step to Reversing Nirvana TitanMist mist.reversinglabs.com Contents Introduction to TitanEngine.. 3 Introduction to TitanMist 4 Creating an unpacker for TitanMist.. 5 References and

More information

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

EMV (Chip-and-PIN) Protocol

EMV (Chip-and-PIN) Protocol EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian

More information

Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor

Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor Principal Malware Researcher 1 Honourable mentions: 2010. Stuxnet digitally signed drivers: stolen certificate June 2012.

More information

Efficient Program Exploration by Input Fuzzing

Efficient Program Exploration by Input Fuzzing Efficient Program Exploration by Input Fuzzing towards a new approach in malcious code detection Guillaume Bonfante Jean-Yves Marion Ta Thanh Dinh Université de Lorraine CNRS - INRIA Nancy First Botnet

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.5, 4.11.2015 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.5, 4.11.2015 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

TCG Algorithm Registry. Family 2.0" Level 00 Revision 01.15. April 17, 2014. Published. Contact: [email protected].

TCG Algorithm Registry. Family 2.0 Level 00 Revision 01.15. April 17, 2014. Published. Contact: admin@trustedcomputinggroup.org. Family 2.0" Level 00 Revision 01.15 April 17, 2014 Published Contact: [email protected] TCG TCG Published Copyright TCG 2014 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS

More information

Title: Bugger The Debugger - Pre Interaction Debugger Code Execution

Title: Bugger The Debugger - Pre Interaction Debugger Code Execution White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

Egil Aspevik Martinsen Polymorphic Viruses. Material from Master Thesis «Detection of Junk Instructions in Malicious Software»

Egil Aspevik Martinsen Polymorphic Viruses. Material from Master Thesis «Detection of Junk Instructions in Malicious Software» Egil Aspevik Martinsen Polymorphic Viruses Material from Master Thesis «Detection of Junk Instructions in Malicious Software» 1 History 1982 Elk Cloner Brain 1987 1260 1992 Ply 1997 Melissa ILOVEYOU Zmist

More information

1. General function and functionality of the malware

1. General function and functionality of the malware 1. General function and functionality of the malware The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access

More information

Slaying the Virtual Memory Monster - Part II

Slaying the Virtual Memory Monster - Part II 1 of 8 04/19/2012 07:53 PM Slaying the Virtual Memory Monster - Part II Reed Robison 1 Oct 2007 4:46 PM 17 Someday I ll learn to write a simple blog post a couple of paragraphs about something cool and

More information

Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010

Inside a killer IMBot. Wei Ming Khoo University of Cambridge 19 Nov 2010 Do you? or Inside a killer IMBot Wei Ming Khoo University of Cambridge 19 Nov 2010 Background Tracking a botnet propagating over Skype & Yahoo IM. Bait is Foto Exploits social connectivity (friend

More information

Preface. DirX Document Set

Preface. DirX Document Set Preface DirX Document Set Preface The DirX Troubleshooting Guide describes how to solve problems that can occur in DirX installations. The book is organized as follows: Chapter 1 provides a summary of

More information

[ X OR DDoS T h r e a t A d v i sory] akamai.com

[ X OR DDoS T h r e a t A d v i sory] akamai.com [ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed

More information

Outlook 2003/2007 NK2 File Format and Developer Guidelines

Outlook 2003/2007 NK2 File Format and Developer Guidelines Outlook 2003/2007 NK2 File Format and Developer Guidelines This post explains how Microsoft Office Outlook 2007 interacts with the nickname cache file, also known as the.nk2 file. The.nk2 file is where

More information

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard

KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7 Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5 Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

This report is a detailed analysis of the dropper and the payload of the HIMAN malware.

This report is a detailed analysis of the dropper and the payload of the HIMAN malware. PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware

More information

esrever gnireenigne tfosorcim seiranib

esrever gnireenigne tfosorcim seiranib esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview

More information

Bypassing Anti- Virus Scanners

Bypassing Anti- Virus Scanners Bypassing Anti- Virus Scanners Abstract Anti-Virus manufacturers nowadays implements more and more complex functions and algorithms in order to detect the latest and newest viruses along with their variants.

More information

Persist It Using and Abusing Microsoft s Fix It Patches

Persist It Using and Abusing Microsoft s Fix It Patches Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : [email protected] Abstract: Microsoft has often used Fix it patches, which are a subset of Application

More information

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook

More information

Malware Analysis Report

Malware Analysis Report NSHC 2014. 02. 20 Malware Analysis Report [ Xtreme RAT ] A server program of Xtreme RAT, a type of RAT (Remote Administration Tool), is distributed recently. The system which is infected with the server

More information

Software Fingerprinting for Automated Malicious Code Analysis

Software Fingerprinting for Automated Malicious Code Analysis Software Fingerprinting for Automated Malicious Code Analysis Philippe Charland Mission Critical Cyber Security Section October 25, 2012 Terms of Release: This document is approved for release to Defence

More information

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109 CROSS REFERENCE Cross Reference Index 110-122 Cast ID Number 110-111 Connector ID Number 111 112-122 2015 Ford Motor Company 109 CROSS REFERENCE Cast ID Number Cast ID Ford Service # MC Part # Part Type

More information

Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs

Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs Absolute Backdoor Revisited Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs BlackHat, Las Vegas August, 2014 What is Computrace? Computrace is an Anti-Theft software

More information

The Value of Physical Memory for Incident Response

The Value of Physical Memory for Incident Response The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical

More information

Heap-based Buffer Overflow Vulnerability in Adobe Flash Player

Heap-based Buffer Overflow Vulnerability in Adobe Flash Player Analysis of Zero-Day Exploit_Issue 03 Heap-based Buffer Overflow Vulnerability in Adobe Flash Player CVE-2014-0556 20 December 2014 Table of Content Overview... 3 1. CVE-2014-0556 Vulnerability... 3 2.

More information

Attacking x86 Windows Binaries by Jump Oriented Programming

Attacking x86 Windows Binaries by Jump Oriented Programming Attacking x86 Windows Binaries by Jump Oriented Programming L. Erdődi * * Faculty of John von Neumann, Óbuda University, Budapest, Hungary [email protected] Abstract Jump oriented programming

More information

CANape CCP Communication Version 1.1 02/06/03 Application Note AN-AMC-1-100

CANape CCP Communication Version 1.1 02/06/03 Application Note AN-AMC-1-100 Version 1.1 02/06/03 Application Note AN-AMC-1-100 Author(s) Restrictions Abstract Kim Lemon Public Document This application note concentrates on explaining the fundamental concepts about CANape and CCP

More information

A Museum of API Obfuscation on Win32

A Museum of API Obfuscation on Win32 A Museum of API Obfuscation on Win32 Masaki Suenaga Senior Software Engineer Contents Abstract... 1 File Image vs. Memory Image... 2 API Analysis... 4 Generating Memory Dumps... 5 Runtime API Address Resolution...

More information

HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011

HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011 MWR InfoSecurity Advisory HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011 Package Name Date 10/11/2011 Affected Versions HTC Windows Phone 7 Phones HTC HD7 confirmed to be vulnerable.

More information

ZeroAccess. James Wyke. SophosLabs UK

ZeroAccess. James Wyke. SophosLabs UK ZeroAccess James Wyke SophosLabs UK Abstract ZeroAccess is a sophisticated kernel-mode rootkit that is rapidly becoming one of the most widespread threats in the current malware ecosystem. ZeroAccess ability

More information

Removing Sentinel SuperPro dongle from Applications and details on dongle way of cracking Shub-Nigurrath of ARTeam Version 1.

Removing Sentinel SuperPro dongle from Applications and details on dongle way of cracking Shub-Nigurrath of ARTeam Version 1. Removing Sentinel SuperPro dongle from Applications Shub-Nigurrath of ARTeam Version 1.0 September 2006 1. Abstract... 2 2. Possible approaches: emulations vs simulation... 3 2.1. How a dongle works...

More information

Configurable Events for APC Network Management Card

Configurable Events for APC Network Management Card Configurable s for APC Network Management Card Table of Contents Silcon DP300E Series 3 Smart-UPS / Matrix 7 Symmetra 9 Symmetra 3-Phase 13 Environmental Monitor 21 Configurable s for APC Network Management

More information

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer

More information

Security of EnOcean Radio Networks

Security of EnOcean Radio Networks V1.9 / Page 1 / 37 V1.1 Content 1... 6 1.1 Terms & Abbreviations... 6 2 Introduction... 6 3 Scenarios... 6 3.1 Attacker scenarios... 7 3.2 System Architecture... 10 4 Specification... 10 4.1 Security for

More information

Fault attack on the DVB Common Scrambling Algorithm

Fault attack on the DVB Common Scrambling Algorithm Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany [email protected] Abstract. The Common Scrambling

More information

Abysssec Research. 1) Advisory information. 2) Vulnerable version

Abysssec Research. 1) Advisory information. 2) Vulnerable version Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5

More information

A TrendLabs Report. 2Q Report on Targeted Attack Campaigns

A TrendLabs Report. 2Q Report on Targeted Attack Campaigns A TrendLabs Report 2Q Report on Targeted Attack Campaigns Contents Introduction...4 Campaigns Observed in 2Q...5 Targeted Attack Campaigns Profiling...5 Affected Industry Sectors...6 Affected Regions...6

More information

On the Security of Digital Video Broadcast Encryption

On the Security of Digital Video Broadcast Encryption On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis Ruhr-Universität Bochum Chair for Communication Security (COSY) Prof. Dr.-Ing. Christof Paar Dipl.-Inf.

More information

Ransomware: Next-Generation Fake Antivirus

Ransomware: Next-Generation Fake Antivirus Ransomware: Next-Generation Fake Antivirus By Anand Ajjan, Senior Threat Researcher, SophosLabs Contents 1. Overview 2 2. Ransomware versus fake antivirus 2 3. The ransomware timeline 3 3.1. Early variants

More information

Analysis and Diversion of Duqu s Driver

Analysis and Diversion of Duqu s Driver Analysis and Diversion of Duqu s Driver Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry To cite this version: Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aurélien Thierry.

More information

3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch

3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch 3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration

More information

Operation Liberpy : Keyloggers and information theft in Latin America

Operation Liberpy : Keyloggers and information theft in Latin America Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation

More information

Introduction to Reverse Engineering

Introduction to Reverse Engineering Introduction to Reverse Engineering Inbar Raz Malware Research Lab Manager December 2011 What is Reverse Engineering? Reverse engineering is the process of discovering the technological principles of a

More information

Return-oriented programming without returns

Return-oriented programming without returns Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy

More information

Digital Forensic analysis of malware infected machine Case study ***

Digital Forensic analysis of malware infected machine Case study *** Abstract Digital Forensic analysis of malware infected machine Case study Amulya Podile, Keerthi G & Krishna Sastry Pendyala# Incident Response & Malware Analysis Unit, Digital Forensics CoE, Tata Consultancy

More information

Packers. (5th April 2010) Ange Albertini http://corkami.blogspot.com Creative Commons Attribution 3.0

Packers. (5th April 2010) Ange Albertini http://corkami.blogspot.com Creative Commons Attribution 3.0 Packers (5th April 2010) Ange Albertini 3.0 Table of contents 3 Models: simple, malware, advanced 4 Categories and Features: compresser, protecter, crypter, bundler, virtualiser, mutater 5 Landscape: Free,

More information

Packers Models. simple. malware. advanced. allocation. decryption. decompression. engine loading. integrity check. DRM Management

Packers Models. simple. malware. advanced. allocation. decryption. decompression. engine loading. integrity check. DRM Management allocation allocation (VirtualAlloc / empty section) trapped start allocation (VirtualAlloc / empty section) (MANY layers,add/rol/xor) startup decompression engine loading (one layer,add/rol/xor) (Tea/RC4/operators)

More information

Hotpatching and the Rise of Third-Party Patches

Hotpatching and the Rise of Third-Party Patches Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments

More information

Soft-Starter SSW-06 V1.6X

Soft-Starter SSW-06 V1.6X Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document

More information

Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security

Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which

More information

Implementation of Web Application Firewall

Implementation of Web Application Firewall Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,

More information

CS61: Systems Programing and Machine Organization

CS61: Systems Programing and Machine Organization CS61: Systems Programing and Machine Organization Fall 2009 Section Notes for Week 2 (September 14 th - 18 th ) Topics to be covered: I. Binary Basics II. Signed Numbers III. Architecture Overview IV.

More information

CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT

CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT CITIZEN LAB TECHNICAL BRIEF 001 IEXPL0RE RAT BY ETH HARDY AUGUT 2012 1 INTRODUCTION This report describes a remote access trojan (RAT) that three human rights-related organizations taking part in a Citizen

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft

More information

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 Creator: Twitter: Blog: Pieter Verstraeten http://www.twitter.com/pverstraeten http://www.pieterverstraeten.com/blog Hi, Thanks for downloading

More information

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This

More information

CIT 480: Securing Computer Systems. Malware

CIT 480: Securing Computer Systems. Malware CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware

More information

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI Swiss Cyber Storm, 18 April 2009 Agenda Part 1: Introduction (~5 ) Infection

More information

finding malware on compromised Windows machines

finding malware on compromised Windows machines S TEVEN ALEXANDER finding malware on compromised Windows machines Steven is a programmer for Merced College. He manages the college s intrusion detection system. [email protected] This article

More information

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =. ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code

More information

Self Protection Techniques in Malware

Self Protection Techniques in Malware DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?

More information

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h Summary McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h August 9, 2013 W32/Autorun.worm.aaeb-h has the ability to infect removable media devices, as well as mounted network shares. Infection starts

More information

G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK

G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK CONTENTS Executive Summary... 2 The Malware used 2 Information Stealing 2 Campaign Analysis... 3 Targets 3 Spear Phishing Campaign

More information

Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"

Pattern Co. Monkey Trouble Wall Quilt. Size: 48 x 58 .............................................................................................................................................. Pattern Co..........................................................................................

More information

The Windows Shortcut File Format as reverse-engineered by Jesse Hager [email protected] Document Version 1.0

The Windows Shortcut File Format as reverse-engineered by Jesse Hager jessehager@iname.com Document Version 1.0 Disclaimer The Windows Shortcut File Format as reverse-engineered by Jesse Hager [email protected] Document Version 1.0 This document is provided AS-IS basis, without any warranties or representations

More information

USB HID to PS/2 Scan Code Translation Table

USB HID to PS/2 Scan Code Translation Table Key Name HID Usage Page HID Usage ID PS/2 Set 1 Make* PS/2 Set 1 Break* PS/2 Set 2 Make PS/2 Set 2 Break System Power 01 81 E0 5E E0 DE E0 37 E0 F0 37 System Sleep 01 82 E0 5F E0 DF E0 3F E0 F0 3F System

More information

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and

More information

For a 64-bit system. I - Presentation Of The Shellcode

For a 64-bit system. I - Presentation Of The Shellcode #How To Create Your Own Shellcode On Arch Linux? #Author : N3td3v!l #Contact-mail : [email protected] #Website : Nopotm.ir #Spcial tnx to : C0nn3ct0r And All Honest Hackerz and Security Managers I - Presentation

More information

Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips

Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc

More information

Reverse Engineering Malware Part 1

Reverse Engineering Malware Part 1 Reverse Engineering Malware Part 1 Author :Arunpreet Singh Blog : https://reverse2learn.wordpress.com MD5 Hash : 1d8ea40a41988b9c3db9eff5fce3abe5 This is First Part of 2 Part Series.This Malware Drops

More information

Dyre: Emerging threat on financial fraud landscape

Dyre: Emerging threat on financial fraud landscape SECURITY RESPONSE Dyre: Emerging threat on financial fraud landscape Symantec Security Response Version 1.0 June 23, 2015 Dyre is a multi-pronged threat and is often used to download additional malware

More information

Binary Representation

Binary Representation Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems

More information

Off-by-One exploitation tutorial

Off-by-One exploitation tutorial Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend

More information

Sniffing SAP R GUI Passwords

Sniffing SAP R GUI Passwords Sniffing SAP R GUI Passwords 6. Juli 2009, Andreas Baus, René Ledosquet Abstract This paper describes a practical attack against the protocol used by SAP R for client server communication. The purpose

More information

The ASCII Character Set

The ASCII Character Set The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.

More information

GB ethernet UDP interface in FPGA

GB ethernet UDP interface in FPGA GB ethernet UDP interface in FPGA NIKHEF, PeterJ 05 August 2013 1 LED0 RxFifos 0 1 n Rx Stream Select Rx_buf2data pkt_buffers Rx Packet Buffer 64 KB Flags Rx_mac2buf Overview Good/Bad Frame Rx FPGA ML605

More information

WLSI Windows Local Shellcode Injection. Cesar Cerrudo Argeniss (www.argeniss.com)

WLSI Windows Local Shellcode Injection. Cesar Cerrudo Argeniss (www.argeniss.com) WLSI Windows Local Shellcode Injection Cesar Cerrudo Argeniss (www.argeniss.com) Overview _ Introduction _ Establishing a LPC connection _ Creating a shared section _ The technique _ Building an exploit

More information

ASCII CODES WITH GREEK CHARACTERS

ASCII CODES WITH GREEK CHARACTERS ASCII CODES WITH GREEK CHARACTERS Dec Hex Char Description 0 0 NUL (Null) 1 1 SOH (Start of Header) 2 2 STX (Start of Text) 3 3 ETX (End of Text) 4 4 EOT (End of Transmission) 5 5 ENQ (Enquiry) 6 6 ACK

More information

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4 BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...

More information

Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code

Introduction. Application Security. Reasons For Reverse Engineering. This lecture. Java Byte Code Introduction Application Security Tom Chothia Computer Security, Lecture 16 Compiled code is really just data which can be edit and inspected. By examining low level code protections can be removed and

More information

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...

More information

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this

More information

Michael Ligh (@imhlv2)

Michael Ligh (@imhlv2) Michael Ligh (@imhlv2) Suspect uses TrueCrypt for disk encryp?on Most recent version: 7.1a Suspect runs Windows 8 / Server 2012 What can you do, given a disk and memory image? Provide three of the most

More information

Network Configuration Example

Network Configuration Example Network Configuration Example OSPF Version 3 for IPv6 Feature Guide Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Hacking cars in the style of Stuxnet

Hacking cars in the style of Stuxnet Hacking cars in the style of Stuxnet András Szijj 1, Levente Buttyán 1, Zsolt Szalay 2 1 CrySyS Lab, Department of Networked Systems and Services 2 Department of Automobiles and Vehicle Manufacturing Budapest

More information

Rijndael Encryption implementation on different platforms, with emphasis on performance

Rijndael Encryption implementation on different platforms, with emphasis on performance Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation

More information

An Introduction to Incident Detection and Response Memory Forensic Analysis

An Introduction to Incident Detection and Response Memory Forensic Analysis An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE [email protected] February 6, 2015 An overview to incident response Detection Analysis Containment Investigation

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position

Command Param1 Param2 Return1 Return2 Description. 0xE9 0..0x7F (id) speed pos_high pos_low Set servo #id speed & read position set Description 0..0x7F (id) Set servo #id target position 0xE1 Read EEPROM 0xE2 Write EEPROM 0xE3 Read memory 0xE4 Write memory 0xE5 Read position 0xE6 Set target position 0xE7 version id Read version

More information

Detecting the One Percent: Advanced Targeted Malware Detection

Detecting the One Percent: Advanced Targeted Malware Detection Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The

More information

ON-BOARDING TOOL USER GUIDE. HKEx Orion Market Data Platform Securities Market & Index Datafeed Products Mainland Market Data Hub (MMDH)

ON-BOARDING TOOL USER GUIDE. HKEx Orion Market Data Platform Securities Market & Index Datafeed Products Mainland Market Data Hub (MMDH) ON-BOARDING TOOL USER GUIDE HKEx Orion Market Data Platform Securities Market & Index Datafeed Products Mainland Market Data Hub (MMDH) Version 1.1 27 May 2013 Document History DOCUMENT HISTORY Distribution

More information

Gameover Zeus Bad Guys and Backends

Gameover Zeus Bad Guys and Backends Gameover Zeus Bad Guys and Backends Elliott Peterson, Michael Sandee, Tillmann Werner August 5, 2015 Cui Honorem, Honorem Dr. Brett Stone-Gross, Dell SecureWorks Frank Ruiz, Fox-IT Dr. Christian Rossow,

More information