Shane Hartman CISSP, GCIA, GREM Suncoast Security Society



Similar documents
RIA SECURITY TECHNOLOGY

Next Generation Clickjacking

Cross Site Scripting in Joomla Acajoom Component

Optimized Mal-Ops Hack ad networks like a boss

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Enterprise Application Security Workshop Series

Advancements in Botnet Attacks and Malware Distribution

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Application Security

Introduction to Computer Security

Analyzing and Detecting Malicious Flash Advertisements

Penetration Testing with Kali Linux

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Web Vulnerability Assessment Report

A Step-by-Step Guide to Setting Up clicktag Tracking in Flash Banner Ads

Intrusion detection for web applications

Application security testing: Protecting your application and data

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence

The Top Web Application Attacks: Are you vulnerable?

Check list for web developers

Web Application Vulnerability Testing with Nessus

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Criteria for web application security check. Version

Outline. CIW Web Design Specialist. Course Content

Network Security Exercise #8

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

I. Supported Browsers. II. Internet Browser Settings

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Hack Proof Your Webapps

What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)


Web Design Specialist

Web Application Penetration Testing

How To Understand The History Of The Web (Web)

CS 558 Internet Systems and Technologies

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Guidelines for Web applications protection with dedicated Web Application Firewall

Magento Security and Vulnerabilities. Roman Stepanov

Cyber Security Challenge Australia 2014

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

New Tool for Discovering Flash Player 0-day Attacks in the. Wild from Various Channels

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

HTTP Response Splitting

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Web application vulnerability scanners are good

University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013

Bypassing Internet Explorer s XSS Filter

Attacks on Clients: Dynamic Content & XSS

HP WebInspect Tutorial

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Gateway Apps - Security Summary SECURITY SUMMARY

Fireworks 3 Animation and Rollovers

The Prevalence of Flash Vulnerabilities on the Web

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Firewalls and Software Updates

elearning for Secure Application Development

Rational AppScan & Ounce Products

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

ONLINE BANNER AND ADVERTISING SPECIFICATIONS 2014

Where every interaction matters.

Sitefinity Security and Best Practices

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Spyware. Summary. Overview of Spyware. Who Is Spying?

Lecture 11 Web Application Security (part 1)

Defending against XSS,CSRF, and Clickjacking David Bishop

FortiWeb 5.0, Web Application Firewall Course #251

Web Tracking for You. Gregory Fleischer

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1

(WAPT) Web Application Penetration Testing

Web Application Security 101

Course Content: Session 1. Ethics & Hacking

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Hacking for Fun and Profit

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Web Application Exploits

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

ADVERTISING SPECS. Base File Weight

Secure Web Development Teaching Modules 1. Threat Assessment

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India

Cross-Site Scripting

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Apache: Analyze Logs for Malicious Activities & Monitor Server Performance

Transcription:

Shane Hartman CISSP, GCIA, GREM Suncoast Security Society

Analyzing Malware Why Flash Malware Structure of an SWF File History of Flash Scripting Exploit Example 1: Social Engineering Exploit Example 2: Clipboard Hijack Exploit Example 3: Multi Step Redirection Exploit Example 4: Shell Code Exploit

Flash player is almost everywhere Platform independent Unix/ Windows It supports an extensive coding To run on a victims browser Place banner ad Inject links to SWF files via SQL Injection or XSS Ask the user to click on link to SWF file

Malicious Javascript is much easier to detect Companies like: Websense Bluecoat Checkpoint FW can analyze the code before its executed. With the introduction of Action Script 3 a highly robust environment * Because it is embedded and executed client side it is much more difficult to analyze, much like Java applets.

Target flash player vulnerabilities Control some aspect of the victims environment ie. The victims clipboard Redirect victim to malicious sites

Header, version, length, frame, info, etc Additional details in the FileAttributes tab Optional in earlier versions Used to tell the Flash Player to use the newer VM for AS 3 Definition and control tags, recognized by tag type number, eg 1 : ShowFrame (displays current frame) 12: DoAction (defines ActionScript 1 or 2) 82: DoABC (defines ActionScript 3)

Version 1: Basic geometry and animations only Version 2: Several animation control tags Version 3: Support for keyboard and mouse events Version 4: Full scripting implementation via actions Version 5 6: Support for ActionScript 1 Version 7 8: Support for ActionScript 2 Version 9+: Support for ActionScript 3 Different VM

Before analyzing flash lets look at malware analysis Behavior Analysis Observe what happens when executed Capture and analyze traffic on the network Attempt to simulate and interact with the program Code Analysis Capture the program / code Decompile / analyze Break down each component and follow the road map

To: victim@example.com Subject: What Up Check this out.. http://img361.imageshack.us/img361/7064/zoxdgeysjn6.swf

Swfextract Flare Dump Flash

Right click on the swf file and select Decompile to product a.flr text file movie c:\temp\zoxdgeysjn6.swf { // flash 6, total frames: 136, frame rate: 12 fps, 1x1, compressed // unknown tag 88 length 78 frame 15 { geturl( http://moyapodruzhka.com/?wmid=44&sid44, ); } }

Clipboard persistently contains an unfamiliar URL Adding new content to the clipboard seems to have no effect

Swfdump abcdump Nemo 440

c:\temp\swfdump Ddu clipboard poc.swf > clipboard poc.swfdump.txt

c:\temp\abcdump clipboard poc.swf notepad clipboard poc.swf.il

Visitors to taringa.net saw the following banner ad. Some were redirected to a site that told them of a spyware problem So, what was going on? Much more complicated

Nothing suspicious when loading the SWF file in the browser Clicking on the ad shows nothing suspicious Could it be sensitive to something: Time URL Parameters, etc.

Decompiled 17113.swf with Flare Code doesn t reveal much Looks to be concealed

ActionScript View P Code View

There are encryptors meant to protect your code The suggestion is they will protect your intellectual work Malware authors are using these tools to make it more difficult to dissect and understand what the malicious code is trying to do

Open 17113.swf > Debug > List variables

<param name= movie value= swf/gnida.swf?campaign=weidoneous&u=1200066806 />

A vulnerability in Flash Player 9 led to many exploits (CVE 2007 0071) A problem with code that processed the scene number Allowed the execution of arbitrary code via shellcode

You can extract hex values from swfdump output An alturnative is to uncompress the SWF file with flashm, then extract with a hex editor

www.mywot.com WOT Security Scorecard

Place code inside and unknown tag and jump there Place code after the end tag and jump there Jump in the middle of the code block Use and abstraction framework Use a commercial protector

Capture as many details from the victim or live site as possible Note HTTP headers, cookies, etc. Disassemble and analyze SWF files, retrieving new files as necessary Unprotect if you can; may be limited to behavioral analysis

Support ActionScript 1 & 2 only Flashm, Flare, Dump Flash Decompiler JSwiff, SWF toolkit (swf_dump) Support ActionScript 3 only abcdump, Flex SDK swfdump, Nemo 440 Supports ActionScript 1,2 & 3 SWFTools swfdump Commercial: Sothink SWF, Decompiler Trillix

ActionScript 3 AVM2 Overview: http://www.adobe.com/devnet/actionscript/articles/avm2overview.pdf SWF File Format Specification: http://www.adobe.com/devnet/swf OWASP Paper on Malicious SWFs: http://www.owasp.org/images/1/10/owasp AppSecEU08 Fukami.pdf OWASP Flash Security Project http://www.owasp.org/index.php/category:owasp_flash_security_project Clickjacking http://www.theregister.co.uk/2008/10/07/clickjacking_surveillance_zombie/ http://www.computerworld.com/action/article.do?command=viewarticlebasic &articleid=9117268&source=rss_topic17