شناسايي سيستم روند نماي کلي انجام يک حملة کامپيوتري شناسايي مواضع و نقاط ضعف سيستم هدف هجوم اوليه تثبيت مواضع برنامه ريزي مرحله بعد عمليات دسترسی جلوگيري.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Windows Security and Rootkits Mike Willard January 2007.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
Introduction of Internet security Sui Wang IS300.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
Introduction to Network Security. Acknowledgements.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Botnets A collection of compromised machines
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Botnets A collection of compromised machines
Faculty of Science IT Department By Raz Dara MA.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

شناسايي سيستم روند نماي کلي انجام يک حملة کامپيوتري شناسايي مواضع و نقاط ضعف سيستم هدف هجوم اوليه تثبيت مواضع برنامه ريزي مرحله بعد عمليات دسترسی جلوگيري از سرويس تخريب کسب دسترسي در سطح کاربر کسب دسترسي در سطح مدير پوشاندن ردپاها نصب دريچه برداشتن يا خراب کردن اطلاعات ساير فعاليتهاي غير مجاز حمله به اهداف ثانويه 2

3 Contents Definitions Spywares Trojan horses Rootkits Covert channels

Definitions A general term for a program that secretly monitors your actions. While they are not sometimes malicious, but like a remote control program used by a hacker receive your private information. Software companies have been known to use Spyware to gather data about customers. An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. Definition from: Texas State Library and Archives Commission - SPYWARE TROJAN HORSE Definition from: BlackICE Internet Security Systems -

Summary of Effects Collection of data from your computer without your agreement Execution of code without your agreement Assignment of a unique code to identify you Collection of data pertaining to your habitual use Installation on your computer without your agreement Inability to remove the software Performing other undesirable tasks without agreement

Similarities / Differences SpywareTrojan Horses Commercially Motivated Malicious Internet connection required Any network connection required Initiates remote connection Receives incoming connection Purpose: To monitor activity Purpose: To control activity Collects data Unauthorized access and control Legal Illegal Not Detectable with Virus Checker Detectable with Virus Checker Age: Relatively New (< 10 Years) Age: Relatively Old ( > 20 Years) Memory Resident Processes Secretly installed without user’s consent or understanding Creates a security vulnerability Source – Table derived and produced by; Andrew Brown, Tim Cocks and Kumutha Swampillai, February 2004.

7 Contents Definitions Spywares Trojan horses Rootkits Covert channels Image Source -

Software Examples GAIN / Gator Gator E-Wallet Cydoor BonziBuddy Google Toolbar Yahoo Toolbar DownloadWare BrowserAid Dogpile Toolbar Image Sources… GAIN Logo – The Gator Corporation – BonziBuddy Logo – Bonzi.com - DownloadWare Logo – DownloadWare -

Spyware Defence Technical Initiatives... Spyware Removal Programs Firewall Technology Disable ActiveX Controls Filters Download Patches Technical Initiatives... Spyware Removal Programs Firewall Technology Disable ActiveX Controls Filters Download Patches User Initiatives… Use Legitimate S/W Sources Improved Technical Ability Choice of Browser Choice of OS User Initiatives… Use Legitimate S/W Sources Improved Technical Ability Choice of Browser Choice of OS

10 Contents Definitions Spywares Trojan horses Rootkits Covert channels

Types of Trojan Horse Remote Access Trojan: allow attacker to gain control over the victim’s pc. Data sending Trojan: provide the attacker confidential data such as password, credit card information. Destructive Trojan: designed to destroy or delete files. Proxy Trojan: to use the victim’s computer as the proxy server for the attackers. FTP Trojan: designed to open ftp port (port 21) on your computer, enable the attacker to connect your PC through File Transfer Protocol. Security software disabler Trojan: designed to stop or kill security software program such as antivirus program and internet security program. Denial of Service (DoS) attack: the attacker try to bring down the network service by flooding the useless traffic over the network.

Trojan Horse: installation Secretly installed when an infected executable is run –Much like a virus –Executables typically come from P2P networks or un- trusted websites ActiveX controls on websites –ActiveX allows automatic installation of software from websites –User probably does not know what they are running

Trojan Horse Examples Hardware –Key loggers –More advanced? Magic Lantern –FBI developed –Legal grey area (until recently!)

Solutions Firewall Virus Checker Spyware Remover Frequent OS updates Frequent back-up Learning problems Use the following security mechanisms

15 Contents Definitions Spywares Trojan horses Rootkits Covert channels

What is a Rootkit? A rootkit is a tool that is designed to hide itself and other processes, data, and/or activity on a system. “A tool used to protect backdoors and other tools from detection by administrators” A rootkit is not –An exploit –A virus or worm

Rootkits - Why Should You Care? If you can’t detect a backdoor on any given machine, how do you know your machine is clean? New viruses will use new rootkit technology

Rootkits - How They Work? To hide in a system you have to control a system Act as a gatekeeper between what a user sees and what the system sees Requires administrator privileges to install

How Rootkits Work - Hooking A standard application

How Rootkits Work - Hooking A hooked application

Rootkits – How They Work? To hide what is taking place, an attacker wants to: –Hide processes –Hide services –Hide listening TCP/UDP ports –Hide kernel modules –Hide drivers

Levels of Access in Windows User Land –User –Administrator –System Kernel Land –Drivers

What Happens When You Read a File? Readfile() called on File1.txt Transition to Ring 0 NtReadFile() processed I/O Subsystem called IRP generated Data at File1.txt requested from ntfs.sys Data on disk 2 requested from disk.sys

Userland (Ring 3) Rootkits Binary replacement eg modified Exe or Dll Binary modification in memory eg He4Hook User land hooking eg Hacker Defender –IAT hooking

Kernel (Ring 0) Rootkits Kernel Hooking E.g. NtRootkit Driver replacement E.g. replace ntfs.sys with ntfss.sys

Kernel (Ring 0) Rootkits IO Request Packet (IRP) Hooking –IRP Dispatch Table E.g. He4Hook (some versions)

Kernel (Ring 0) Rootkits Filter Drivers Types –File system filter –Volume filter –Disk Filter –Bus Filter

Current Rootkit Capabilities Hide processes Hide files Hide registry entries Hide services Completely bypass personal firewalls Undetectable by anti virus Covert channels - undetectable on the network Install silently

Detection Methodologies Traditional Detection –Check integrity of important OS elements against a hash database (sigcheck) –Look for unidentified processes (task manager) –Check for open ports (netstat)

Detection Methodologies Signature based –Look for known rootkits, viruses, backdoors –Antivirus –Look for “bad things” living in memory Problems –Requires updated databases –Doesn’t detect anything it hasn’t seen before

Detection Methodologies Code verification –Code sections are read only in all modern OSes –Programs should not modify their own code –Check to see if the files on disk match what is running in memory

Detection Methodologies: Code Verification

Hardware Rootkits A OS reinstall won’t save you Hard to remove. –Device is usually destroyed Difficult to implement With more and more memory on devices they are becoming prevalent with time

34 Contents Definitions Spywares Trojan horses Rootkits Covert channels

Part 2  Access Control 35 Covert Channel Covert channel: a communication path not intended as such by system’s designers For example, resources shared at different levels could be used to “signal” information

Covert Channel Example Alice has TOP SECRET clearance, Bob has CONFIDENTIAL clearance Suppose the file space shared by all users Alice creates file FileXYzW to signal “1” to Bob, and removes file to signal “0” Once per minute Bob lists the files –If file FileXYzW does not exist, Alice sent 0 –If file FileXYzW exists, Alice sent 1 Alice can leak TOP SECRET info to Bob!

Covert Channel Example Alice: Time: Create fileDelete fileCreate fileDelete file Bob: Check file Data: 10101

Covert Channel Other possible covert channels? –Print queue –ACK messages –Network traffic, etc. When does covert channel exist? 1.Sender and receiver have a shared resource 2.Sender able to vary some property of resource that receiver can observe 3.“Communication” between sender and receiver can be synchronized

Covert Channel So, covert channels are everywhere “Easy” to eliminate covert channels: –Eliminate all shared resources… –…and all communication Virtually impossible to eliminate covert channels in any useful system –DoD guidelines: reduce covert channel capacity to no more than 1 bit/second –Implication? DoD has given up on eliminating covert channels!

Covert Channel Consider 100MB TOP SECRET file –Plaintext stored in TOP SECRET location –Ciphertext (encrypted with AES using 256-bit key) stored in UNCLASSIFIED location Suppose we reduce covert channel capacity to 1 bit per second It would take more than 25 years to leak entire document thru a covert channel But it would take less than 5 minutes to leak 256- bit AES key thru covert channel!

Real-World Covert Channel Hide data in TCP header “reserved” field Or use covert_TCP, tool to hide data in –Sequence number –ACK number

Real-World Covert Channel Hide data in TCP sequence numbers Tool: covert_TCP Sequence number X contains covert info A. Covert_TCP sender C. Covert_TCP receiver B. Innocent server SYN Spoofed source: C Destination: B SEQ : X ACK (or RST ) Source: B Destination: C ACK : X