Julius Inigo MIS 304 November 10, 2011

Slides:



Advertisements
Similar presentations
Célzott informatikai támadások napjainkban Boldizsár Bencsáth PhD Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology.
Advertisements

Targeted attacks of recent days Boldizsár Bencsáth PhD Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics.
Rodney Buike IT Pro Advisor, Microsoft Canada
What I hope to get out of Dig/It By: CY HOWARD. 1. I am taking a Technology Elective Course for Skill Building on how to use a computer and how to work.
Primary Threats to Computer Security
Saturday, 09 September 2006 ©RSH Number Prime Numbers and Prime factors.
Rootkits: Sneaky, Stealthy Toolboxes
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Pulse-modulated Radar Display Processor on a Chip Talal Darwich Center for Advanced Computer Studies University of Louisiana at Lafayette.
OPERATION SYSTEM (WINDOWS) VIRUS REMOVAL. COMPUTER VIRUS - Type of malware that, when executed, replicates by inserting copies of itself (possibly modified)
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
A sophisticated Malware Arpit Singh CPSC 420
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
East Hartford High School Library Media Center Monthly Report June 2011.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
D. Beecroft Fremont High School VIRUSES.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
computer
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Ben Obrien 10N ICT homework 6 6th November. The ‘Yaha.K’ Virus The spread of the Windows worm, called Yaha.K, has led anti-virus firms to.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
By : Madison Cook and Nesha Owens.  World Wide Web was invented by Tim Berners-Lee and Robert Cailliau.  International Society for Technology in Education.
ECE 172A SIMPLE OBJECT DETECTOR WITH INDICATOR WHEN A NEW OBJECT HAS BEEN ADDED TO OR MISSING IN A ROOM Presented by by Hugo Groening.
Using Engine Signature to Detect Metamorphic Malware Mohamed R. Chouchane and Arun Lakhotia Software Research Laboratory The University of Louisiana at.
Bachelor of Engineering In Image Processing Techniques For Video Content Extraction Submitted to the faculty of Engineering North Maharashtra University,
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
SharePoint Conferences 2011 Overview. Microsoft SharePoint Conference 2011 Anaheim, CA (October 3-6) Over 240 sessions Over 7500 attendees
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Microsoft ® IT Academy in Rockingham County Public Schools Kelly Troxell, Ed.D., Director Career and Technical Education Marshall Price, Director Massanutten.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Overview Microsoft Information Management
How to Remove Websearch. Install the Anti-Malware Software.
Chapter 40 Internet Security.
Microsoft® IT Academy in Rockingham County Public Schools
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
12 | Monitoring Office 365 Anthony Steven | Principal Technologist, Content Master Martin Coetzer | Portfolio Architect, Microsoft.
Advantages in Computational Thinking
Day 12 – September 11th Objective: To write an equations of a line given its slope and a point on the line  
Various Types of Malware
Computational Thinking
Online Gifts Buy for wishes happy mother's day to yours choice and with happy gifts find here:
HP Computer Support Number. How To Fix HP Computer’s Blurry or Stretched Issues? Step 1: Restart the computer Step 2: Adjust the display resolution.
GeoMesh Blockchain Networking - Slide Presentation
Kaspersky Antivirus Support Phone Number. About Kaspersky Antivirus Kaspersky Antivirus is known as Antiviral toolkit pro. Kaspersky Antivirus is a program.
Code-red worm Attack on Computers.
Propagation, behavior, and countermeasures
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
ECO day Thursday 1st November
TMX 2012 LAB DEMO LAB 2 [WEB PUBLISHING] by: Ahmad Hafiz
Cyber Up! Digital Forensics & Incident Response Tobi West
GDPR Partner / Customer Engagement Flow
Finite State Machine II
Day 1: Introduction to Ramp Tools
Шаттық шеңбері.
Microsoft Power Platform
Presentation transcript:

Julius Inigo MIS 304 November 10, 2011 Duqu Detector Toolkit Julius Inigo MIS 304 November 10, 2011

Overview What is Duqu? How does Duqu work? Detection Tools

What is Duqu It is computer worm First discovered September 1, 2011 Steals digital certificates and information Removes itself after 36 days

How does Duqu work?

Detection Tools The Duqu Detector Toolkit v1.01 NSS Labs’ tool Microsoft?

References http://www.zdnet.com/blog/security/open- source-duqu-detector-toolkit- released/9790?tag=mantle_skin;content http://www.pcworld.com/businesscenter/arti cle/243555/opensource_toolkit_tracks_down _duqu_infections.html http://en.wikipedia.org/wiki/Duqu http://www.infoworld.com/d/security/open- source-toolkit-tracks-down-duqu-malware- 178622

Questions?