Worms, Trojan Horses and Root Kits



Similar documents
Computer Networks & Computer Security

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Securing your Linux Server: Racing against the attacker. Nigel Edwards Hewlett-Packard

Chapter 11 Phase 5: Covering Tracks and Hiding

Common Cyber Threats. Common cyber threats include:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

IDS / IPS. James E. Thiel S.W.A.T.

Network- vs. Host-based Intrusion Detection

Hackers: Detection and Prevention

Network and Host-based Vulnerability Assessment

Nixu SNS Security White Paper May 2007 Version 1.2

What Do You Mean My Cloud Data Isn t Secure?

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Top Ten Cyber Threats

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Traditional Rootkits Lrk4 & KNARK

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Firewalls and Software Updates

Network Incident Report

Operating Systems Principles

SCP - Strategic Infrastructure Security

HoneyBOT User Guide A Windows based honeypot solution

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

The Self-Hack Audit Stephen James Payoff

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

How Spyware and Anti-Spyware Work

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Global Partner Management Notice

TIME TO LIVE ON THE NETWORK

Spyware Doctor Enterprise Technical Data Sheet

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Host-based Intrusion Prevention System (HIPS)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Recommended Practice Case Study: Cross-Site Scripting. February 2007

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Rootkit: Attacker undercover tools By Saliman Manap

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Computer Security DD2395

Host/Platform Security. Module 11

IDS and Penetration Testing Lab ISA 674

F-SECURE MESSAGING SECURITY GATEWAY

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 8

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Hacking Database for Owning your Data

The Ten Most Important Steps You Can Take to Protect Your Windows-based Servers from Hackers

Codes of Connection for Devices Connected to Newcastle University ICT Network

Second-generation (GenII) honeypots

IPS Attack Protection Configuration Example

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

Ed Ferrara, MSIA, CISSP Fox School of Business

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Security Audit Report for ACME Corporation

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Securing Database Servers. Database security for enterprise information systems and security professionals

GFI White Paper PCI-DSS compliance and GFI Software products

Security Event Management. February 7, 2007 (Revision 5)

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Cyber Security Awareness

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Certified Ethical Hacker (CEH)

Windows Remote Access

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Rootkit: Analysis, Detection and Protection

ESET SMART SECURITY 9

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

Intruders and viruses. 8: Network Security 8-1

E-BUSINESS THREATS AND SOLUTIONS

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

The Trivial Cisco IP Phones Compromise

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

AN OVERVIEW OF VULNERABILITY SCANNERS

Computer Viruses: How to Avoid Infection

Data Security for the Hospitality

By:XÇzA A TÅÅtÜ ]A `t{åééw

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Discovering passwords in the memory

TECHNICAL WHITEPAPER

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Transcription:

Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently: Ramen Worm Lion worm Adore Worm

Ramen Worm First discovered in January of 2001 Attacks RedHat Linux 6.2, 7.0 systems The worm randomly selects a class B address and attempts to use well known exploits against rpc.statd, wu-ftpd and LPRng to gain access Ramen Worm: Detection If you re running a web server, the worm replaces your index.html with the page on the following slide. Starts a http daemon on tcp port 27374 for newly infected hosts to download code

index.html RameN Crew Hackers looooooooooooooooove noodles This site powered by Ramen Worm: Countermeasures Apply vendor patches for vulnerable services Note: The worm patches the holes it used to gain access so no other system cracker can get in. (Isn t that nice of them!)

Lion Worm Exploits weakness in BIND to gain root access Listens on port 27374 Sends out email to huckit@china.com with /etc/passwd, /etc/shadow and network settings Randomly generates class B network addresses to scan Scans network for exploitable hosts Lion Worm (cont d) Once it exploits a host, it installs the torn root kit. Ports 60008/tcp and 33567/tcp get bound to a backdoor root shell A trojaned version of SSH gets bound to 33568/ tcp

Lion Worm: Detection/Countermeasures Apply latest vendor patches A system integrity checker will detect the presence of modified binaries Scan hosts/network for open signature ports Use IDS to detect Lion Worm traffic Lionfind is a utility that checks for the presence of the binaries/ports associated with Lion Adore Worm First appeared around April 1, 2001 Similar to Ramen and Lion Exploits BIND, rpc.statd, LPRng on Redhat Linux systems Emails information, including /etc/passwd to a few different email addresses Countermeasures: Same as other worms Adorefind utility will detect it on a system.

Trojan Horses A program which appears to be legitimate, but performs unintended actions. Trojan Horses can install backdoors, perform malicious scanning, monitor system logins and su. Back Doors A Backdoor allows a malicious attacker to maintain privileged access to a compromised host Unix back doors are typically installed via a Worm, Root Kit or manually after a system has been initially compromised Windows back doors are typically installed via a Virus, Worm or Trojan Horse. Virus and Worms via Email, sharing infected files, Open Windows shares Trojan Horses typically included with legitimate application such as a game etc.

Windows Backdoors Back Orifice Back Orifice 2000 (BO2K) NetBus WinVNC (Virtual Network Computing) SubSeven Back Orifice/BO2k A Remote Administration tool for windows 9x and NT. Runs on remote system without user knowing Client can control several servers simultaneously Allows client complete control over server system including logging all keystrokes at the console. (Passwords, email, etc) By default server listens on tcp 54320 or udp 54321

BO/BO2k: Countermeasures Password protect all windows file shares Run Anti-virus software. (Most detect BO/BO2k) Configure Firewall/IDS system to watch ports 54320 and 54321 Check hosts and scan network for those open ports on systems Buttsniff, BO Detect, BOPing, BORED are all tools to detect the presence of BO Netbus Provides Remote Administration of Windows 9x and NT systems Allows full control over windows and devices. (open and close windows remotely, Screen capture, open and close CDROM tray) Logs keystrokes Listens on TCP/UDP 12345 and 12346 (configurable v 1.7 and up) for connections Listens on TCP/UDP 20034 (v.2.x) for connections

Netbus: Countermeasures Password protect windows file shares Run Anti-virus software (Most detect Netbus) Looks for open signature ports (Locally or scan the network) NetBuster is a program that runs on the local system to detect Netbus SubSeven Windows remote administration utility. Allows full control over windows and devices. Many features not found in other remote admin. Tools get Windows CD-Key retrieve dialup usernames/passwords, phone numbers AOL/Microsoft/Yahoo - IM spy ICQ hijacking

SubSeven: Client www.sub7files.com Easy to use interface Extremely configurable SubSeven: Server Easy to use interface Extremely configurable

SubSeven: Countermeasures Password protect windows file shares Run Anti-virus software (Most detect Netbus) Check hosts and scan the network for open signature ports. Run IDS system to detect SubSeven traffic Unix Backdoors Backdoors on Unix are typically a shell bound to a network port. A remote attacker can connect to the network port and execute commands A trojaned daemon such as SSH (included in a root kit) may provide root access without a password.

Root Kits A rootkit is a collection of tools that allows the hacker to provide a backdoor to the system, collect information about other hosts on the network, mask the fact that the system is compromised Hides the intruder s activity on the system Allows intruder to keep the privileged access - NOT to initially obtain it Root Kits are Trojan Horses and typically provide a Back Door. Most root kits can be detected by running an integrity checker such as Tripwire T0rn Kit

T0rn Kit: Detection Knark Kernel based root kit for Linux using Loadable Kernel Module Hide files Hide running processes Hide active network connections Change the user and group permissions of running processes

Knark: Detection Processes hidden by Knark, and Knark itself can be unhidden by sending a kill -32 to the process. By sending a kill -32 to every possible process ID, you can unhide Knark LIDS: Linux Intrusion Detection System Seals the kernel from modification Prevents loading and unloading of kernel modules Locks shared memory segments Protects sensitive /dev/ files Protects against process ID manipulation