Information Networking Security and Assurance Lab National Chung Cheng University Investigating Hacker Tools.

Slides:



Advertisements
Similar presentations
Introducing JavaScript
Advertisements

Creating a Dialog-Based Comet Windows Program Brian Levantine.
ICS103 Programming in C Lecture 1: Overview of Computers & Programming
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Introduction to Web Database Processing
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Tutorial 10 Programming with JavaScript
1 CE6130 現代作業系統核心 Modern Operating System Kernels 許 富 皓.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
CS 225 Lab #2 - Pointers, Copy Constructors, Destructors, and DDD.
XP Tutorial 1 New Perspectives on JavaScript, Comprehensive1 Introducing JavaScript Hiding Addresses from Spammers.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Introduction Purpose Objectives Content Learning Time
Microsoft ® Official Course Monitoring and Troubleshooting Custom SharePoint Solutions SharePoint Practice Microsoft SharePoint 2013.
Web Page A page displayed by the browser. Website Collection of multiple web pages Web Browser: A software that displays web pages on client computer.
1 Introduction to Tool chains. 2 Tool chain for the Sitara Family (but it is true for other ARM based devices as well) A tool chain is a collection of.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Spring 2014 SILICON VALLEY UNIVERSITY CONFIDENTIAL 1 Introduction to Embedded Systems Dr. Jerry Shiao, Silicon Valley University.
Debugging techniques in Linux Debugging Techniques in Linux Chetan Kumar S Wipro Technologies.
F13 Forensic tool analysis Dr. John P. Abraham Professor UTPA.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
What is FORENSICS? Why do we need Network Forensics?
© 2008, Renesas Technology America, Inc., All Rights Reserved 1 Purpose  This training module provides an overview of optimization techniques used in.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Program Development Life Cycle (PDLC)
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Old Chapter 10: Programming Tools A Developer’s Candy Store.
Tutorial 10 Programming with JavaScript
Invitation to Computer Science 5 th Edition Chapter 6 An Introduction to System Software and Virtual Machine s.
EECS 354 Network Security Reverse Engineering. Introduction Preventing Reverse Engineering Reversing High Level Languages Reversing an ELF Executable.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
1998 PI System Users’ Conference PI 3.2 New Features Enhancements Product Support Plans for the next release.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Android Security Auditing Slides and projects at samsclass.info.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Intro to PHP IST2101. Review: HTML & Tags 2IST210.
CNIT 127: Exploit Development Ch 3: Shellcode. Topics Protection rings Syscalls Shellcode nasm Assembler ld GNU Linker objdump to see contents of object.
COEN 250 Computer Forensics Windows Life Analysis.
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Lab 9 Department of Computer Science and Information Engineering National Taiwan University Lab9 - Debugging I 2014/11/4/ 28 1.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
© 2002 IBM Corporation Confidential | Date | Other Information, if necessary Copyright © 2009 Ericsson, Made available under the Eclipse Public License.
Some of the utilities associated with the development of programs. These program development tools allow users to write and construct programs that the.
The World Leader in High Performance Signal Processing Solutions Toolchain Basics.
XP Creating Web Pages with Microsoft Office
For more information on Rouge, visit:
CHAPTER 4 Methodology.
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Debugging with gdb gdb is the GNU debugger on our CS machines.
Part 1: Basic Analysis Chapter 1: Basic Static Techniques
Digital Pacman: Firewall Edition
Hands-On Ethical Hacking and Network Defense
IS3440 Linux Security Unit 7 Securing the Linux Kernel
COEN 252 Computer Forensics
Functions of an operating system
Program Execution in Linux
Basic Dynamic Analysis VMs and Sandboxes
3.8 static vs dynamic thread management
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University Investigating Hacker Tools

Information Networking Security and Assurance Lab National Chung Cheng University 2 Outline Preface How files are Compiled Static analysis of a hacker tool Dynamic analysis of a hacker tool

Information Networking Security and Assurance Lab National Chung Cheng University 3 Outline Preface How files are Compiled Static analysis of a hacker tool Dynamic analysis of a hacker tool

Information Networking Security and Assurance Lab National Chung Cheng University 4 The Goals Prevent similar attacks in the future Assess an attacker’s skill or threat level Determine the extent of a compromise Determine if any damage was done Determine the number and type of intruders Prepare yourself for successful subject interview if you catch the attacker Determine the attacker’s objectives and goals

Information Networking Security and Assurance Lab National Chung Cheng University 5 Outline Preface How files are Compiled Static analysis of a hacker tool Dynamic analysis of a hacker tool

Information Networking Security and Assurance Lab National Chung Cheng University 6 Statically Linked Programs A statically linked executable file contains all the code necessary to successfully run the application Don’t have any dependencies

Information Networking Security and Assurance Lab National Chung Cheng University 7 Dynamically Linked Programs Shared libraries  Contain commonly used functions and routines Reduce the size of the executable file Conserve system memory Update the shared libraries without the change of the original programs

Information Networking Security and Assurance Lab National Chung Cheng University 8 Shared Libraries System Memory Dynamic Program Static Program Statically Compiled Program Printf Function Contained Within the Program’s Object Code Dynamically Compiled Program Printf Stub to Reference other Memory Location Static Program vs. Dynamic Program

Information Networking Security and Assurance Lab National Chung Cheng University 9 Programs Compiled with Debug Options With debug options  Include a lot of information about the program and its source code

Information Networking Security and Assurance Lab National Chung Cheng University 10 The comparison of the file size The file size

Information Networking Security and Assurance Lab National Chung Cheng University 11 The stripped programs Strip is a function that discards all symbols from the object code to make a file much smaller and perhaps more optimal for execution The command line The smaller file size

Information Networking Security and Assurance Lab National Chung Cheng University 12 Programs Packed with UPX (Ultimate Packer for eXecutables) An effective compression tool for executable files A hacker can obscure their illicit programs from signature-based IDS A review of the ASCII-formatted strings within the rogue code will show whether UPX was used to compress the executable

Information Networking Security and Assurance Lab National Chung Cheng University 13 An example of UPX

Information Networking Security and Assurance Lab National Chung Cheng University 14 An example of Symbol Extraction (1/2) $nm –a zapdynamic Debugging information is included, use $nm –al zapdebug Symbol value Symbol type

Information Networking Security and Assurance Lab National Chung Cheng University 15 An example of Symbol Extraction (2/2) Symbol type  Lowercase A local variable  Uppercase A global variable $man nm

Information Networking Security and Assurance Lab National Chung Cheng University 16 Outline Preface How files are Compiled Static analysis of a hacker tool Dynamic analysis of a hacker tool

Information Networking Security and Assurance Lab National Chung Cheng University 17 What and the step you should follow Static analysis is tool analysis performed without actually executing the rogue code The general approach to static analysis involves the following steps  Determine the type of file you are examining  Review the ASCII and Unicode strings contained within the binary file  Perform online research to determine if the tool is publicly available on computer security or hacker sites  Perform source code review if you either have the source code or believe you have identified the source code via online research

Information Networking Security and Assurance Lab National Chung Cheng University 18 Determine the Type of File The command The magic file

Information Networking Security and Assurance Lab National Chung Cheng University 19 Review the ASCII and Unicode Strings $strings –a filename $hexedit  Allow you to see Unicode and ASCII strings within a file at the same time Look for the following items  The name if the source code files before the application was compiled  The exact compiler used to create the file  The “help” strings in the tool  The error messages that the program displays  The value of static variable

Information Networking Security and Assurance Lab National Chung Cheng University 20 Performing Online Research and Source Code Review It’s very helpful to find the same tool Two occasion  The attacker leaves the source code on the system  Find the identical program from another source with the proper source code

Information Networking Security and Assurance Lab National Chung Cheng University 21 Outline Preface How files are Compiled Static analysis of a hacker tool Dynamic analysis of a hacker tool

Information Networking Security and Assurance Lab National Chung Cheng University 22 What and the task you should do Dynamic analysis of a tool takes place when you execute rogue code and interpret its interaction with the host operating system Methodology must includes the following tasks  Monitor the time/date stamps to determine what files a tool affects  Run the program to intercept its system calls  Perform network monitoring to determine if any network traffic is generated  Monitor how Windows-based executables interact with the Registry

Information Networking Security and Assurance Lab National Chung Cheng University 23 Set up your test environment You need to invest the time to set up the proper test environment  VMware Make sure that the test system is not connected to the Internet  Beacon packet  Phone home Or your can execute it on a closed network

Information Networking Security and Assurance Lab National Chung Cheng University 24 Intercept the system call User applications use system calls to request the kernel System trace ($strace)  Wiretap between a program and the operating system The output file Execute the rouge program

Information Networking Security and Assurance Lab National Chung Cheng University 25 The example_1 of strace

Information Networking Security and Assurance Lab National Chung Cheng University 26 The example_2 of strace (1/3)

Information Networking Security and Assurance Lab National Chung Cheng University 27 The example_2 of strace (2/3)

Information Networking Security and Assurance Lab National Chung Cheng University 28 The example_2 of strace (3/3)

Information Networking Security and Assurance Lab National Chung Cheng University 29 Conducting Analysis Beyond strace Debugging Decompiling  Linux Assembly web site  Tool Interface Standard’s and Manuals on the Mr. Dobbs Microprocessor Resources web site  objdump  nm  gdb

Information Networking Security and Assurance Lab National Chung Cheng University 30 Dynamic Analysis on a Windows System filemon  Provide a wiretap between running processes and the file system. regmon  Tap a process’s interaction with the Windows Registry listdlls  Show all of the DLLs needed by a process fport  Determine what port the rouge program opens flist  Determine if a process changes its process name after execution

Information Networking Security and Assurance Lab National Chung Cheng University 31 filemon

Information Networking Security and Assurance Lab National Chung Cheng University 32 regmon

Information Networking Security and Assurance Lab National Chung Cheng University 33 listdlls

Information Networking Security and Assurance Lab National Chung Cheng University 34 fport

Information Networking Security and Assurance Lab National Chung Cheng University 35 pslist