HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid 60-564 Project 1 Fall 2004.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Two Downloading and Installing Software.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
What is Spyware? Where did it come from?.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
What is a Firewall Anyway?
NetAcumen ActiveX Download Instructions
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Chapter 8 Damage Control How to remove viruses and spyware infections.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Week:#14 Windows Recovery
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Spyware & Internet Security
Physical Cleaning Disconnect Power Open the Case.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
eScan Total Security Suite with Cloud Security
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
How to Avoid Spyware By Hottman Computers & Consulting Co
Basic Computer Cleanup Larry James ResNet Manager.
KEEP IT CLEAN!. YOUR COMPUTER THAT IS! Why? Detect Viruses & Malware BEFORE they cause damage Speed up your computer Eliminate annoying unwanted software.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
Troubleshooting Windows Vista Security Chapter 4.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Fall 2005 Using FrontPage to Enhance Blackboard - Darek Sady1 Using FrontPage to Enhance Blackboard 1.Introduction 2.Starting FrontPage 3.Creating Documents.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Module 7 Configure User and Computer Environments By Using Group Policy.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Return to the PC Security web page Lesson 5: Dealing with Malware.
June 2013 LCCU Meeting Organize links, images, and files for your projects, trips, hobbies, etc. using Evernote notebooks. We’ll use a multiple laptop.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Internet Security and Your Computer Welcome to Boot Camp.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
1.Nattawut Chaibuuranapankul M.2/6 No. 8 2.Poonnut Sovanpaiboon M.2/6 No.11 3.Sarin Jirasinvimol M.2/6 No Attadej Rujirawannakun M.2/6 No.28.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SOP PENGGUNAAN JUPEM2U.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
PREVENTION Cleaning/Housekeeping BASIC MONTHLY CHECK OFF LIST (Minimum requirement): –Cleaning »Physical Cleaning »Clean internal dust bunnies with canned.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Running Windows Securely and Efficiently By Gary Esworthy.
Speeding Up Your PC Roger Libman. Typical Repair Orders.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Keeping your System/Computer healthy and Operating
Windows Tutorial 5 Protecting Your Computer
A+ Guide to Managing and Maintaining Your PC, 7e
Keeping your System/Computer healthy and Operating
Remove Security Tool Recently, quite a number of staff infected by Security Tool. This is so called Rogue software. User simply click some link in the.
Windows Vista Inside Out
Presentation transcript:

HijackThis - A general Homepage Hijacker Detector and Removal Tool By: Tahira Farid Project 1 Fall 2004

Overview Browser Hijacking and Why The Techniques Preventing a Hijack HijackThis- A Hijack Removal Tool Download Information Getting around with the tool

Overview (cont.) Testing Summary Important things learnt Useful Links References

What is Browser Hijacking? Where browser’s default settings is forcibly modified by using scripting tools Spyware takes over our internet settings, Redirects our searches and steals our homepage adding links to favourites changing homepage persistently - scripting - changing registry values - auto-running programs - secret files put on the hard disk

Why Hijacking? Bring us back to a website or a sponsor’s site of Hijacker’s choice Generate advertising revenues Keep users trapped in their sites Expand website’s traffic Is it Reversible? - as easy as to switch the internet options back -as crucial as to undo the changes by going to windows registry

The Techniques Multiple Windows pop-ups while leaving the site Windows half off screen hard to close and allows no control Offering “freebies” in their sites Installing AOL software, messenger, ICQ adds to IE’s trusted sites zone without our permission-can download activeX, run scripts, perform various actions. Removing internet options from tool menu and control panel Changing reg settings to reset homepage Installing program to reset homepage on reboot

Preventing Hijack Various anti-hijacking and anti-virus tools available. HijackThis- utility tool to remove browser hijacks, viruses, trojans & spyware Does not target specific prog./URLs Targets methods used by hijackers

HijackThis Developed by Marijn Freeware 178 KB latest version: Intended for advanced users Increasingly updated to detect & remove new hijacks Runs on all windows OS

Download Info & caution Required to place it in its own folder otherwise backups will not be made. Recommended to be used after running spybot or spyware/hijacker remover- malware files will be left behind. Requires knowledge in windows and OS in general. If deleted entries without knowing- problems as IE not working, running windows.

Caution(cont) Scans registry and various files in HD. Entries similar to what a spyware/hijacker program would leave behind Interpreting the results can be tricky. Legitimate programs get installed in similar way hijackers get installed. Extra causion should be taken fixing a problem.

Getting started Go to the desired folder where hijackthis was created from zip unpack. Double click on hijackthis.exe

Scan results Each line starts with a section name

Info on selected items To know info about a selected obj

Fix entries Select an item to fix/remove

Restoring items deleted mistakenly We can make backup & restore items for erroneous scenarios for items which were removed but legitimate. Under config button

Generating startup listing Has a built-in tool to generate listing of all the prog that launch when comp starts. Under config, Misc tools option.

Process Manager Built-in tool to 1)Kill processes that are currently running 2)Check what DLLs are loaded in a particular process Under config, Misc tools option

Process Manager (cont.)

Hosts File Manager View our host file, Delete lines Toggle lines on/off HijackThis will add a “#” sign before the line to comment it out so that it will not be used by Windows.

Delete on reboot Sometimes files obstinately reject to get deleted from the system by any traditions means. Could be virus/ spyware HijackThis allows windows to delete the file on reboot.

HijackThis log Each line on the scan list starts with a section name Each entry has a 2-letter code to say what it is.

Testing Windows XP SP2 Running spybot S&D, ad-aware Specific problem in IE: always redirects to Even using spybot S&D, AboutBuster, Spywareblaster, Ad-aware problem was still there Following entries were deleted after scan: O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF BB3} - (no file) 02 entries refers to BHO- plugins for browser that extend the functionality of it. Used by spyware & legitimate programs. CLSID refers to reg. entries that contains info about BHO/toolbars. This particular entry means the entry exists in the registry but the associated file does not exist. Therefore cleaned to tidy up the registry.

Testing (cont.) R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = R0,R1 entries refer to IE start page & search functions. The url R0, R1 are pointing to is unwanted. Therefore cleaned to get rid of it.

Testing (cont.) O4 - HKLM\..\Run: [SysTime]  startup item C:\WINDOWS\system32\systime.exe  Trojan downloaded O4 - HKCU\..\Run: [SysTime] C:\WINDOWS\system32\systime.exe 04 entries refer to app that are listed in certain keys in reg/startup folders and are loaded automatically when windows starts. Here 04 entry shows a CoolWebSearch Trojan. Therefore fixed by HijackThis. The corresponding file C:\WINDOWS\system32\systime.exe was deleted by running windows on safe mode after fixing with HijackThis.

Testing (cont.) O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} entries refer to ActiveX obj-programs that are downloaded from websites and stored in our computer. Also referenced in the reg by their CLSID. Here the object/URL could not be recognized from where it was downloaded. Therefore cleaned by HijackThis. HijackThis also deletes the offending file from C:\Windows\Downloaded Program Files- where the these types of objects are stored.

Testing (cont.) Booting with safe mode following file was deleted C:\WINDOWS\system32\systime.exe Temp internet files were deleted System rebooted normally, Ad-aware was run to do some more cleanup. No bad entries were found in the new log.

Summary HijackThis is a very powerful tool to root out serious infestation or attack in our system. we should be cautious enough, since incorrectly removing inappropriate objects can cause problems with legitimate programs and compromise our system. Many online forums & tutorials for inspecting logfiles. Useful links available for CLSID, startup lists. we need a great deal of devotion, commitment and knowledge towards our system security. HijackThis by itself can not make our system secure from Hijackers, we need other relevant tools as well to detect and remove spyware and viruses.

Important things learnt In order to keep computer clean and secure: Make our Internet Explorer more secure by customizing security options. Use an AntiVirus Software Use Spyware & Malware remover utility tools Spybot S&D, Ad-aware, CWShredder, HijackThis, SpywareBluster Update our AntiVirus Software Use a Firewall Visit Microsoft's Windows Update Site Frequently Update all these programs regularly

Useful links HijackThis log file analysis: TonyK's Browser Helper Obj (BHO) & Toolbar list: PacMan's Start-up list to find the entry and see if it's good or bad.

References html html ?showtutorial=42#RDiag ?showtutorial=42#RDiag

Thank You!