Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.

Slides:



Advertisements
Similar presentations
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
شناسايي سيستم روند نماي کلي انجام يک حملة کامپيوتري شناسايي مواضع و نقاط ضعف سيستم هدف هجوم اوليه تثبيت مواضع برنامه ريزي مرحله بعد عمليات دسترسی جلوگيري.
Windows Rootkits – Userland API Hooking Robert Vinson – IT Security Analyst – University of Iowa 09/06/06.
Students: Jacek Czeszewski and Marcos Verdini Rosa Professor: José Manuel Magalhães Cruz.
Windows Security and Rootkits Mike Willard January 2007.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Presented by Boris Yurovitsky
Rootkits: Sneaky, Stealthy Toolboxes
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
Copyright John “Four” Flynn This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Root Kits and Windows Hardening Team BAM! Scott Amack Everett Bloch Maxine Major.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
1 UCR Firmware Attacks and Security introduction.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
CIS 450 – Network Security Chapter 15 – Preserving Access.
Honeypot and Intrusion Detection System
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Rootkits in Windows XP  What they are and how they work.
Omicron Consulting 1700 Market Street Philadelphia, PA Troubleshooting Windows Problems Presented by: David F. Soll Vice President, Omicron Consulting.
Copyright Security-Assessment.com 2006 Defeating Live Forensics in the Windows Kernel Presented by Darren Bilby AUSCERT 2006.
Copyright Security-Assessment.com 2006 Low Down and Dirty: Anti-forensic Rootkits Presented by Darren Bilby Ruxcon 2006.
Windows Vista Security David Kenney Christopher Lange.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
When Your Dog Can’t Help You: Malware in the Home Stephen Rondeau Institute of Technology 7 May 2008.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
CAP6135: Malware and Software Vulnerability Analysis Rootkits Cliff Zou Spring 2012.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Rootkits What are they? What do they do? Where do they come from?
RootKit By Parrag Mehta OUTLINE What is a RootKit ? Installation Types How do RootKits work ? Detection Removal Prevention Conclusion References.
Computer security By Isabelle Cooper.
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
Rootkit Hunting vs. Compromise Detection Joanna Rutkowska invisiblethings.org Black Hat Federal 2006, Washington D.C., January 25 th 2006.
W elcome to our Presentation. Presentation Topic Virus.
Lecture 7 Rootkits Hoglund/Butler (Chapter 5-6). Avoiding detection Two ways rootkits can avoid detection –Modify execution path of operating system to.
VMM Based Rootkit Detection on Android
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Rootkits vs. Stealth by Design Malware Joanna Rutkowska invisiblethings.org Black Hat Europe 2006, Amsterdam, March 2 nd 2006.
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
Lecture 8 Rootkits Hoglund/Butler (Chapter 7-8). Avoiding detection Two ways rootkits can avoid detection –Modify execution path of operating system to.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Securing Network Servers
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Chap 10 Malicious Software.
Hiding Malware Rootkits
Chap 10 Malicious Software.
Presentation transcript:

Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006

Copyright Security-Assessment.com 2006 Disclaimer This presentation is not designed to scare you (but it might) Using these tools within your organisation without explicit permission is a bad idea

Copyright Security-Assessment.com 2006 Overview Introduction What is a rootkit? How rootkits work Rootkit capabilities Rootkit demo Detection methodologies Detection demo Mitigations Hardware rootkits Conclusion

Copyright Security-Assessment.com 2006 Sony Rootkit First mainstream media coverage of a rootkit Discovered by Mark Russinovich when using his rootkit detection software Sony used “rootkit” technology to protect their copy protection mechanism from users – Anything that was named $SYS was hidden from the system, even the Administrator

Copyright Security-Assessment.com 2006 What is a Rootkit? “A rootkit is a tool that is designed to hide itself and other processes, data, and/or activity on a system.“ – G. Hoglund ( A toolkit used for preservation of remote access or “root” “A tool used to protect backdoors and other tools from detection by administrators” A rootkit is not – An exploit of any kind – A virus or worm

Copyright Security-Assessment.com 2006 Rootkits - Why Should You Care? Your current methods for investigating a suspicious machine could be defunct If you can’t detect a backdoor on any given machine, how do you know your machine is clean? New viruses will use new rootkit technology

Copyright Security-Assessment.com 2006 Rootkits - How They Work To hide in a system you have to control a system Act as a gatekeeper between what a user sees and what the system sees Whoever hooks lowest wins Requires administrator privileges to install

Copyright Security-Assessment.com 2006 Rootkits – How They Work To hide what is taking place an attacker wants to: – Survive system restart – Hide processes – Hide services – Hide listening TCP/UDP ports – Hide kernel modules – Hide drivers

Copyright Security-Assessment.com 2006 Levels of Access in Windows Ring 3 – User Land – User – Administrator – System Ring 0 – Kernel Land – Drivers

Copyright Security-Assessment.com 2006 What Happens When You Read a File? Readfile() called on File1.txt Transition to Ring 0 NtReadFile() processed I/O Subsystem called IRP generated Data at File1.txt requested from ntfs.sys Data on D: requested from dmio.sys Data on disk 2 requested from disk.sys

Copyright Security-Assessment.com 2006 Userland (Ring 3) Rootkits Binary replacement eg modified Exe or Dll Binary modification in memory eg He4Hook User land hooking eg Hacker Defender – IAT hooking

Copyright Security-Assessment.com 2006 Kernel (Ring 0) Rootkits Kernel Hooking E.g. NtRootkit Driver replacement E.g. replace ntfs.sys with ntfss.sys Direct Kernel Object Manipulation – DKOM E.g. Fu, FuTo

Copyright Security-Assessment.com 2006 Kernel (Ring 0) Rootkits IO Request Packet (IRP) Hooking – IRP Dispatch Table E.g. He4Hook (some versions)

Copyright Security-Assessment.com 2006 Kernel (Ring 0) Rootkits Filter Drivers – The official Microsoft method Types – File system filter – Volume filter – Disk Filter – Bus Filter E.g. Clandestine File System Driver (CFSD)

Copyright Security-Assessment.com 2006 Current Rootkit Capabilities Hide processes Hide files Hide registry entries Hide services Completely bypass personal firewalls Undetectable by anti virus Remotely undetectable Covert channels - undetectable on the network Defeat cryptographic hash checking Install silently All capabilities ever used by viruses or worms

Copyright Security-Assessment.com 2006 Ring 3 Rootkit: Hacker Defender Hacker Defender – Most widely used rootkit on Windows – Hides processes – Hides TCP / UDP port bindings – Uses simple INI file configuration – Easy to detect and remove with defaults – Not too difficult to modify to avoid detection Commercial Hacker Defender No longer available

Copyright Security-Assessment.com 2006 Hacker Defender - Demo

Copyright Security-Assessment.com 2006

Ring 3 Rootkit: FU FU Rootkit – Utilises Direct Kernel Object Manipulation (DKOM) – Hide processes specified in a file – Escalate privileges of processes – Hooks calls and rewrites dlls in memory – Event Viewer modification – Hides device drivers Other examples: He4Hook, Klog, ShadowWalker, Adore, Suckit

Copyright Security-Assessment.com 2006 FU Rootkit - Demo

Copyright Security-Assessment.com 2006 Detecting Rootkits

Copyright Security-Assessment.com 2006 Common Giveaways Something weird is happening… Rootkits often cause system instability – Bluescreens on normally stable systems – Errors when you attempt to shutdown or reboot Detected bad network traffic Antivirus/IDS alerts

Copyright Security-Assessment.com 2006 Detection Methodologies Traditional Detection – Check integrity of important OS elements against a hash database (sigcheck) – Look for unidentified processes (task manager) – Check for open ports (netstat) Problems – Can be subverted easily

Copyright Security-Assessment.com 2006 Detection Methodologies Signature based – Look for known rootkits, viruses, backdoors – Antivirus – Look for “bad things” living in memory Problems – Requires updated databases – Doesn’t detect anything it hasn’t seen before

Copyright Security-Assessment.com 2006 Detection Methodologies Hook detection – Look for modified IAT tables – Look for inline hooks – Look for modification to important tables E.g. – VICE – System Virginity Verifier – SDT Restore – IceSword Problems – False positives – AV products

Copyright Security-Assessment.com 2006 How Rootkits Work - Hooking A standard application

Copyright Security-Assessment.com 2006 How Rootkits Work - Hooking A hooked application

Copyright Security-Assessment.com 2006 Detection Methodologies Code verification – Code sections are read only in all modern OSes – Programs should not modify their own code – Check to see if the files on disk match what is running in memory E.g. – System Virginity Verifier (SVV) – VICE

Copyright Security-Assessment.com 2006 Detection Methodologies: Code Verification

Copyright Security-Assessment.com 2006 Detection Methodologies Cross View Detection – Take a view of a system at a high level. e.g. Windows Explorer – Take a view of the system at a low (trusted) level. e.g. Raw Disk – Registry, Files, Processes – Compare the two Examples – Sysinternals - Rootkit Revealer – Microsoft Research – Strider Ghostbuster Problems – What if someone hooks below your “trusted” level

Copyright Security-Assessment.com 2006 Good Tools Sysinternals – Autoruns – Procexp – Rootkit Revealer Icesword F-Secure Blacklight System Virginity Verifier Dark Spy RKDetector

Copyright Security-Assessment.com 2006 Detection Demo Detecting the Hacker Defender rootkit – Rootkit Revealer – Icesword

Copyright Security-Assessment.com 2006 Rootkit RevealerRootkit Revealer Icesword

Copyright Security-Assessment.com 2006 Mitigation Don’t let an attacker get system level access… EVER! Host Intrusion Prevention Up to date antivirus and spyware protections Utilise the operating system tools available – Windows XP SP2 DEP – Vista new technology

Copyright Security-Assessment.com 2006 So where else can attackers hide? Hardware based rootkits Yes, they do exist in the wild!

Copyright Security-Assessment.com 2006 Hardware Rootkits A OS reinstall won’t save you Hard to remove. – Device is usually destroyed Difficult to implement Very hard to detect With more and more memory on devices they are becoming prevalent with time VideoCardKit ( – Stores code in FLASH or EEPROM EEye Bootroot – Installs in real mode via network PXE boot

Copyright Security-Assessment.com 2006 Conclusions Rootkit technology is an arms race Hard to tell who is winning Staying on top of developments is difficult Antivirus may catch up (one day…) Vista may solve some problems Firewalls do not provide protection

Copyright Security-Assessment.com 2006 Conclusions No one tool will detect all rootkits, run at least 3 tools Rootkit Revealer Fsecure Blacklight IceSword System Virginity Verifier An updated Antivirus It is impossible to re-establish trust on a compromised system If you are targeted with a custom rootkit you have very little chance of detecting it Network segregation, least privilege, internal host hardening all become extremely important

Copyright Security-Assessment.com 2006 Resources Windows System Internals 4 th Edition– D. Solomon, M. Russinovich Rootkits – G. Hoglund, J. Butler Primary Windows Rootkit Resource Joanna Rutkowska – Stealth Malware Detection F-Secure Blacklight – Sysinternals – Rootkit Detector –

Copyright Security-Assessment.com 2006 Questions ?