© 2005 Nevis Networks – Proprietary and Confidential 1 2015-8-21 Attacking Antivirus Feng Xue Syscan’08 HongKong.

Slides:



Advertisements
Similar presentations
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Advertisements

By Hiranmayi Pai Neeraj Jain
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Warren Toomey North Coast TAFE Port Macquarie campus
Offensive Security Part 1 Basics of Penetration Testing
Explanations Of Software Utilities By Tim Wong.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
EICAR 2009, 12 May 2009 Checkvir Realtime Anti-Malware Testing and Certification Dr. Ferenc Leitold, Veszprog Ltd.
Vulnerabilities. flaws in systems that allow them to be exploited provide means for attackers to compromise hosts, servers and networks.
How to maintain your computer
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Honeypot and Intrusion Detection System
BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES By: Eric Chien and Peter Szor Presented by: Jesus Morales.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Types of Electronic Infection
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Linux Networking and Security
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Operating Systems Security
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Chapter 9: Networking with Unix and Linux. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences.
Web Security Firewalls, Buffer overflows and proxy servers.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 11, 2011.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
VM: Chapter 7 Buffer Overflows. csci5233 computer security & integrity (VM: Ch. 7) 2 Outline Impact of buffer overflows What is a buffer overflow? Types.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Reach us at Call: | Visit:
Vulnerability Expert Forum eEye Research April 14, 2010.
© iViZ Security Inc 0 May 2013 Bikash Barai, Co-Founder & CEO Why Current Security Solutions Fail?
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Secure Coding Techniques
Three steps to prevent Malware infection
TMG Client Protection 6NPS – Session 7.
Chapter 6 Application Hardening
Protecting Memory What is there to protect in memory?
Attacking Antivirus Software's Kernel Driver
Secure Software Development: Theory and Practice
CS 465 Buffer Overflow Slides by Kent Seamons and Tim van der Horst
Presentation transcript:

© 2005 Nevis Networks – Proprietary and Confidential Attacking Antivirus Feng Xue Syscan’08 HongKong

© 2005 Nevis Networks – Proprietary and Confidential Who Am I Technical Lead at Nevis LabsNevis Labs Most of the time working on the – Vulnerability discovery – Vulnerability analysis – M$ Black Tuesday, etc. Discovered over 30 vulnerabilities in the popular software, including Microsoft, Symantec, Apple, Trend Micro, HP, Real Networks, etc.30 vulnerabilities Recently focused on the Antivirus software security – Lots of AV vulnerabilities.

© 2005 Nevis Networks – Proprietary and Confidential Outline Why can AV be targeted Finding vulnerability of Antivirus Exploiting Antivirus Few words for vendors Future work

© 2005 Nevis Networks – Proprietary and Confidential Why Can Antivirus Be Targeted People trust Anti-virus too much – “I am safe, because I have installed an Antivirus!” Antivirus serves the security gate for incoming files What if attackers attack antivirus?

© 2005 Nevis Networks – Proprietary and Confidential Why Can AV Be Targeted - Continue Antivirus is a common component – Over 80% of people are using antivirus software [Reference-8] Cross-platform exploitation – As great as the Java and Adobe vulnerabilities Antivirus is error-prone

© 2005 Nevis Networks – Proprietary and Confidential Why AV is error prone? User input (files being scanned) is totally unpredictable Too many format to deal with – How can AV process hundreds of formats correctly? Lots of the vulnerabilities exist in the following major components of Antivirus engine:  Unpack  Decompression

© 2005 Nevis Networks – Proprietary and Confidential Finding vulnerabilities of Antivirus

© 2005 Nevis Networks – Proprietary and Confidential Audit Antivirus Local Privilege Escalation ActiveX Engine – Source code audit – Reversing – Fuzzing Management

© 2005 Nevis Networks – Proprietary and Confidential Audit - Local Privilege Escalation Weak DACL – Installation Directory. – Service. SC.exe Driver issues – IOCTL handler, Insufficient address space verification. DC2.exe – SSDT Hook. BSODHook.exe – Fuzz the Driver! Investigate the BSOD.

© 2005 Nevis Networks – Proprietary and Confidential Audit - Local Privilege Escalation Demo 1 Rising Antivirus SSDT Hook 0day

© 2005 Nevis Networks – Proprietary and Confidential Audit – ActiveX Control Installed by Antivirus product; Free Online Scan Service; Download Manager Problems: Insecure Method: Design error – CA – SigUpdatePathFTP() – Kaspersky - StartUploading() Buffer Overflow – Symantec, CA, Authentium, RAV, etc

© 2005 Nevis Networks – Proprietary and Confidential Audit – ActiveX Control Fuzzing and Manually audit AxManScript fuzzer for memory corruption ComRaiderGUI fuzzer for memory corruption OleViewManually audit ActiveX FileMon File Operation RegMon Registry Operation TCPview Port, Network connection Wireshark Sniff network traffic

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine Most of the Engine problem exists in the Format Parsing Memory Corruption – Stack overflow, Heap overflow, Memory Access/Modification Denial of Service – CPU (Most of the AV vulnerable to ZIP/CHM processing problem in the past) – DISK Space (NOD32 will eat N*GB disk space when scanning a malicious ARJ file, Demo2) Detection Bypass

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine Demo2 NOD32 Disk Space D.o.S

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Source Code Must have access to the source code Time consuming Open Source ClamAV is the best one for practice – 49 CVE matches Tools: Coverity, FlawFinder, RATS,ITS4, SPLINT, CodeScan,

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Reversing Reverse the file format plugin one by one! – Microsoft Windows OneCare: mpengine.dll – Kaspersky: Arj.ppl base64.ppl cab.ppl lha.ppl rar.ppl Typical: Memory allocation, string copy, integer wrapper Advantage: – Effective against all Closed Source AV – Can uncover more subtle vulnerabilities Disadvantage: – Extremely time consuming – Tools: IDA, Hex-rays

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Fuzzing! Few people thought about fuzzing Antivirus Few Antivirus fuzzer published – Vxfuzz – Taviso Fuzzing Antivirus is easier than most of the other fuzzing Even a dozen lines script could uncover many exploitable vulnerabilities!

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Fuzzing! What we need? Good samples – rar, zip, chm, arj, lha, lzh, tar, tgz, doc, xls, upx, fsg, more – CreateARJ, MakeCAB, WACE, WinZIP, WinRAR, PowerISO, various PE packers, Google (filetype:xxx) A big hard disk. – For test case Debugger – Windbg, Ollydbg, Immunitydebugger Fuzzer – Original fuzzer is actually a File generator – Script language: Python/Perl/C – May need to deal with the CRC

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Fuzzing! How? 4 steps Create test case. – By using the script you wrote, samples created – 0xFFFFFFFF, 0xFFFF, 0x0000, 0x0001, etc, Download the trial version AV and install Scan! Do not forget to start the debugger Go to Sleep: Leave your computer fuzzing

© 2005 Nevis Networks – Proprietary and Confidential Audit – Engine: Fuzzing! Demo 3 Fuzzing Mcafee for 0day ;)

© 2005 Nevis Networks – Proprietary and Confidential Audit Result By auditing the mainstream Antivirus Engine, we have found and published: AhnLab AV Remote Kernel Memory Corruption TrendMicro AV UUE Decoding Format String Vulnerability Avast! AV TGZ Parsing Heap Corruption Mcafee AV BZIP2 Parsinig Memory Corruption (working with vendors) NOD32 ARJ Denial Of Service. (working with vendors) OneCare (working with vendors) More upcoming!

© 2005 Nevis Networks – Proprietary and Confidential Audit – Management Client/Server management – Proprietary Protocol – Fuzzing: Sulley, Spike Web Interface – Web server developed by the vendor, or Apache – Lots of webfuzzer available, e.g. webfuzz

© 2005 Nevis Networks – Proprietary and Confidential Exploiting Antivirus

© 2005 Nevis Networks – Proprietary and Confidential Exploiting Antivirus Local Privilege Escalation ActiveX Engine Management (Administrator) Anything else?

© 2005 Nevis Networks – Proprietary and Confidential Local Privilege Escalation Weak DACL (installation Directory /Service) – Can be exploited to gain escalated privileges by simply replacing files in the installation directory! – Symantec, McAfee, TrendMicro,VBA32,Panda, PC Tools, CA eTrust, ZoneAlarm, AVG, BitDefender, Avast!, Kaspersky. – Panda made the mistake twice! CVE CVE Driver IOCTL handler issues – Arbitrary memory overwrite. Hooking rarely used system call – Symantec, AVG, ZoneAlarm, Trend Micro, AhnLab Other – Scan job (CA scan job Format String vulnerability)

© 2005 Nevis Networks – Proprietary and Confidential ActiveX - Exploitation Convince the victim to visit a webpage Rising Online Scanner ActiveX Control Insecure Method by John Smith <object classid="clsid:E4E2F180-CB8B-4DE9-ACBB-DA745D3BA 153" id="rav" > rav.BaseURL = " rav.Encardid = "0000$0000$0000"; rav.UpdateEngine(); olupdate.zip

© 2005 Nevis Networks – Proprietary and Confidential Engine – Exploitation Mail Server Web P2P IM

© 2005 Nevis Networks – Proprietary and Confidential Root the Mail Server - continue

© 2005 Nevis Networks – Proprietary and Confidential Root the Mail Server - continue Attachment: Exploit.ZIP Body: whatever Subject: whatever To: From: PK………………….?1.5 …………………………. AAAAAAAAAAAAAAAA

© 2005 Nevis Networks – Proprietary and Confidential Root the Mail Server - continue Advantage: Pre-Authentication + 0 Interaction! (The recipients do not need to receive and/or open the malicious s. ) Disadvantage: Attackers have to figure out which antivirus software is installed on the target mail server, How?

© 2005 Nevis Networks – Proprietary and Confidential Antivirus Remote Fingerprint

© 2005 Nevis Networks – Proprietary and Confidential Antivirus Vendors Will Help You

© 2005 Nevis Networks – Proprietary and Confidential Exploiting the Engine from Web Demo 4 Exploiting AhnLab AV through Web

© 2005 Nevis Networks – Proprietary and Confidential P2P/IM/

© 2005 Nevis Networks – Proprietary and Confidential Engine Exploitation - continue Antivirus engine exploitation is just limited by your imagination!

© 2005 Nevis Networks – Proprietary and Confidential Management - Exploitation Client/Server management – e.g. CVE Symantec Remote Management BOF, which was later exploited by a variant of SpyBot worm Web Interface – e.g. CVE Symantec AV Scan Engine Administrative Interface Heap Overflow others – e.g. CVE CA License Component Multiple buffer overflow vulnerabilities

© 2005 Nevis Networks – Proprietary and Confidential To Antivirus Vendors All the files (being scanned) are evil! Security Development Lifecycle (SDL) ASLR, DEP/NX,etc Code Review PenTest

© 2005 Nevis Networks – Proprietary and Confidential To Antivirus Vendors - continue One Suggestion for the design Is that possible to separate the file format parsing process in a lower privilege service? Does it worth?

© 2005 Nevis Networks – Proprietary and Confidential Future work Security of security products What should we do when the Antivirus fails? What about firewall? IPS? IDS?

© 2005 Nevis Networks – Proprietary and Confidential Questions?