Roshan Newa Saransh Chauhan. About Windows XPerience  first consumer oriented OS built on Windows NT kernel  first released on 25 October 2001  Improved.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

By Hiranmayi Pai Neeraj Jain
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Computer Viruses.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
The MS Blaster worm Presented by: Zhi-Wen Ouyang.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Web server security Dr Jim Briggs WEBP security1.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing software on personal computer
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
1 Computer Security: Protect your PC and Protect Yourself.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Hands-On Microsoft Windows Server 2008
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
To receive our video stream in LiveMeeting: - Click on “Voice & Video” - Click the drop down next to the camera icon - Select “Show Main Video” Dial-in.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
University of Management & Technology 1 Operating Systems & Utility Programs.
Troubleshooting Windows Vista Security Chapter 4.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Malicious Software.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Network security Vlasov Illia
Instructor Materials Chapter 7 Network Security
Configuring Windows Firewall with Advanced Security
Chapter 2: System Structures
Chapter 3: Windows7 Part 4.
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Information Security Session October 24, 2005
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Roshan Newa Saransh Chauhan

About Windows XPerience  first consumer oriented OS built on Windows NT kernel  first released on 25 October 2001  Improved GUI, tight integration of application such as IE and Windows Media player, firewall  much vaunted most secured Windows OS so far.  40 Million SLOC (Source lines of code)

UPnP  protocols that allow devices to connect and communicate seamlessly  dynamically join a network, obtain an IP address, announce its name, convey its capabilities upon request, and learn about the presence and capabilities of other devices  used in XP to detect and integrate with UPNP aware devices by providing a URL for automatic configuration

UPnP Flaw in XP  three separate exploits:  a remote buffer overflow flaw, which can load remote code into an XP system;  Denial of Service (DoS)  Distributed Denial of Service (DDoS) flaws, which can let intruders use zombie XP systems to flood Internet servers with bogus requests

UPnP in XP : Buffer Overflow  The memory registers EAX and ECX are overwritten causing them to contain invalid addresses  svchost.exe process will access an invalid memory address at a 'mov' instruction  The SSDP service also listens on Multicast and Broadcast addresses  Gaining system access to an entire network of XP machines is possible with only one anonymous UDP SSDP attack session

UPnP in XP: DoS and DDoS  UPNP device sends out an advertisement  Attacker:  sends a,malicious spoofed UDP packet containing an SSDP advertisement  force the XP client to connect back to a specified IP address and pass on a specified HTTP/HTTPS request  specify a CHARGEN (Character Generator) service on a remote machine causing the XP client to connect and get caught in a tight read/malloc loop

UPnP in XP  Deliberate intention by Microsoft for UPnP to work that way.  Microsoft describes the flaw as "unprecedented" and "serious," and the company is providing a wide range of fixes  Microsoft Security Bulletin MS01-054

Escalation of Privilege (EOP)  Permission against verification of identity.  exploiting a bug or design flaw to gain access to resources  result : the application performs actions with more privileges than intended  Elevation of privilege," then, is not a class of attack, as much as it is the process of any attack.

EOP in XP  EOP: Vertical and Horizontal  Identity demonstrated by tokens associated user.  software program obtain privileges  Installation/startup script tells your system what the software needs in order to run  system tracks privileges associated with each user and application  Applications not needing extensive permissions usually run with privileges of the current request.  Installing as administrator have access to more privileges needed

Attacking via EOP in XP  Run code on the victim's machine borrowing the privileges of one of his system-level apps.  find process that is running with higher privileges  Crash it so that you do something that makes it give its privileges to you  interrupt the program as it executes, and makes it run additional code supplied by the attacker  install a set of tools, referred to as a root kit

EOP in XP : Examples  C:\Documents and Settings\All Users\Start Menu\Programs\Startup  Flaw in Network Connection Manager (Microsoft Security Bulletin MS02-042)  Vulnerability in Plug and Play (Microsoft Security Bulletin MS05-055)  Vulnerability in Windows (Microsoft Security Bulletin MS06-075)  Vulnerability in Windows Kernel (Microsoft Security Bulletin MS06-049)  Vulnerability in Internet Information Services (Microsoft Security Bulletin MS08-005)

XP Recovery Console  perform a limited range of tasks using a CLI  enable administrators to recover from situations where Windows does not boot to GUI  Use, copy, rename, or replace files and folders  Enable or disable service or device startup  Repair the boot sector or (MBR)  Create and format partitions on drives

Flaw in XP Recovery Console  Win2k Boot Disc Can Bypass Windows XP Passwords  In Win2k password is mandatory, Under Windows XP, this technique grants the user unrestricted access to the computer  physical access to a PC for a long enough period of time  install keystroke logging software to steal passwords or backdoor programs to grant themselves unrestricted remote access

Flaw in XP Recovery Console  problem is unrelated to a registry feature of XP that allows an Administrator to set up automatic logon when the Recovery  BIOS level password  Encrypted file system  put the PCs behind a locked door or put a lock on the PCs themselves

Remote Code Execution  Feature of network enabled application.  ability to trigger any arbitrary command on the target machine or a target process without physical access to the target system  worst effect a bug can have because it allows an attacker to completely take over the vulnerable process  commonly exploited by malware to run on a computer without the owners consent

Remote Code Execution in XP  Typically triggered by buffer overflow and holes in applications:  help and Support center feature:  remotely execute code on vulnerable systems because of the way the Help and Support Center handles HCP URL validation  triggered by visiting a malicious website or viewing a malicious message  unregister the HCP protocol to block known attack vectors by deleting from the registry

Remote Code Execution in XP  IGMPv3  vulnerability exists in the Internet Group Management Protocol Version 3 (IGMPv3) for IPv4 and the Multicast Listener Discovery (MLD) for IPv6  a remote, unauthenticated attacker, sending specially crafted packets, could run arbitrary code in the security context of SYSTEM  Zipped folders flaw could allow remote code execution  Serious AIM flaw allows remote code execution without user interaction

…change of guard

COMEDY OF ERRORS William Shakespeare

COMEDY OF ERRORS (XP-SP2) Bill Gates

Window’s URI Handling  Windows shell insufficiently handles invalid URIs  Attacker could gain the same user rights as the logged on user  What if the user is administrator? Attacker could take complete control of an affected system

Window’s URI Handling Modus Operandi  Create a specially crafted URI  Provide the URI as input to an application  The app attempts to access the resource referred by the URI  Processing specially crafted URI input could allow arbitrary code to be executed

Remote Desktop DDoS attacks  Could let an attacker remotely crash computers  Affects the Windows Remote Desktop Service  Users experience errors ranging from inability to use certain services to small error messages  Nothing much serious, thankfully… link

Remote Desktop DDoS attacks  A version of the Win32 API - may allow a local user to elevate his privileges  Might allow a remote attacker to execute arbitrary code on this host  Attacker needs to find a way to misuse of Win32 API  Lure a user into visiting a specially crafted web page  Execute active content on a web page

Windows Explorer Vulnerability Remote code execution risk  Windows Explorer provides a GUI for accessing file system  Windows handling of COM objects

Windows Explorer Vulnerability Modus Operandi  Get user to click on a link to a malicious website  User prompted to perform several actions needed to connect to a certain file server  File server causes Windows Explorer to fail and allow code execution  Activated with link in message

and by the way…  How long do you think you would take to find a bug in your code?  What if your code exceeds millions of lines?

Don’t ask Bill Gates; he took seven years…

SMB Remote Code Execution ( )  SMB (Server Message Block)  Windows Server service - connects different network resources over a network  File servers  Print servers  Send malicious messages to a Windows machine using Windows Server - attempt to take control of the computer

SMB Remote Code Execution MS blog says: "Public tools, including a Metasploit module, are available to perform this attack." Metasploit is an open-source toolkit used by hackers and security professionals to build attack code

SMB Remote Code Execution Modus Operandi  Victim sent a malicious message  Message, when opened, would try to connect to a server run by the attacker  Steal network authentication credentials from the victim, used to gain access to the victim's machine.  Attack cannot be made across the firewall, only the machines in your local LAN can exploit this flaw

Worms

Blaster - Win32/Msblast  First reported on August 11, 2003  Reverse engineered a Microsoft patch  Launched a DDoS attack on windowsupdate.com - MS temporarily shut down the site

Blaster - Win32/Msblast Modus Operandi  Exploits a RPC Distributed Component Object Model (DCOM) vulnerability  Displays messages that Bill Gates might not like… “billy gates why do you make this possible ? Stop making money and fix your software!!” And “I just want to say LOVE YOU SAN!!”

Blaster - Win32/Msblast Detects internet connection and restarts Executes a fake batchfile to restarts the system Registry entry, launched every time Windows starts: HKEY_LOCAL_MACHINE\SOF TWARE\Microsoft\Windows\Cu rrentVersion\Run\windows auto update = msblast.exe Image Source :

Win32/Sasser  Started spreading on April 30, 2004  Exploits a Buffer Overflow in LSASS (Local Security Authority Subsystem Service)  Scans IP addresses and connects to victims' computers primarily through TCP port 445 and 139

Win32/Sasser  Adds a file file C:\WIN.LOG or C:\WIN2.LOG on the PCs hard disk  Shutdown timer appears due to the worm crashing LSASS.exe  Can be checked by a firewall

Sasserization Effects of the Sasser Worm  News agency Agence France-Presse (AFP) had all its satellite communications blocked for hours  Delta Air Lines having to cancel several trans- atlantic flights  The British Coastguard had its electronic mapping service disabled for a few hours

…and finally…