When Your Dog Can’t Help You: Malware in the Home Stephen Rondeau Institute of Technology 7 May 2008.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Cosc 4765 Cleaning up.. So… The Windows machine has been infected/comprised or just “acting funny”. How to clean it up. Hope you have backups…
Operating System Customization
Access Control Chapter 3 Part 5 Pages 248 to 252.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Windows Forensics 10 Apr 2007 TCSS431: Network Security Stephen Rondeau Institute of Technology Lab Administrator.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
A+ Guide to Managing and Maintaining Your PC, 7e
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
A+ Guide to Managing and Maintaining Your PC, 7e
Windows XP Administration: The Basics An Institute of Technology Labs Basic Skills Seminar.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Chapter 7 Installing and Using Windows XP Professional.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Hands-On Microsoft Windows Server 2008
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
INTRODUCTION TO COMPUTING CHAPTER NO. 03. Operating Systems and Utility Programs Functions of Operating Systems Types of Operating Systems (Standalone.
Keeping your computer current and trouble free Aaron Robertson.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 7 Fixing Windows Problems.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
University of Management & Technology 1 Operating Systems & Utility Programs.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
1 Higher Computing Topic 8: Supporting Software Updated
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Windows Forensics 24 Jan 2008 TCSS431: Network Security Stephen Rondeau Institute of Technology Lab Administrator.
COEN 250 Computer Forensics Windows Life Analysis.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
11 INSTALLING AND MANAGING HARDWARE Chapter 6. Chapter 6: Installing and Managing Hardware2 INSTALLING AND MANAGING HARDWARE  Install hardware in a Microsoft.
Computer security By Isabelle Cooper.
COEN 250 Computer Forensics Windows Life Analysis.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
IT1001 – Personal Computer Hardware & System Operations Week5- Installation and configuration of driver software.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
W elcome to our Presentation. Presentation Topic Virus.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Windows Administration How to protect your computer.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
How to Fix Missing WMVCore.dll Error in Windows 10
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Security Architecture of Windows
Welcome © GTM Software. Welcome © GTM Software.
A+ Guide to Managing and Maintaining Your PC, 7e
CONFIGURING HARDWARE DEVICE & START UP PROCESS
16. Account Monitoring and Control
G061 - Network Security.
6. Application Software Security
Presentation transcript:

When Your Dog Can’t Help You: Malware in the Home Stephen Rondeau Institute of Technology 7 May 2008

Home Scenario Effect 1 Effect 2 Effect 3 Effect 4 Effect 5 Effect 6 Effect 7

In Dog We Trust Dogs: – are better than us, in these senses: smell, seeing (in dark and movement), hearing –can detect differences quickly –may bark to alert us of differences –can scare, chase away, or harm other animals –are great as home monitors and defenders

Schank’s For the Memory We learn/follow scripts in various situations –We and others play roles in script Scripts are stereotyped sequence of actions We summon a script for a given situation Leads to expectations of things to occur Roger Schank & Robert Abelson, Scripts, Plans, Goals, and Understanding: An Inquiry Into Human Knowledge Structures, Lawrence Erlbaum, 1977

Scripting the Night: Fantastic! –Determine If Something Is “Wrong” –Form Idea of What May Have Happened –Arm Yourself/Prepare to Raise Alarm/Hide –Locate the Source/Follow the Evidence –Observe/Confirm Suspicions –Disarm/Contain, Scare Away or Remove the Intruder –Block/Monitor Means of Entry –Determine What Was Removed, Damaged, Left Behind –Replace, Clean/Fix, Remove

Is Something “Wrong”? Implies knowing what is “right” –know your system in terms of: authorized users valid services and applications, especially those using network how much time some programs take to run how long it normally takes to download something what files you have or disk space you use in short, look for anomalies in: –users, running programs, performance, network traffic, and file space

What May Have Happened Did you or someone you trust recently… –add a new user account? –add a user to the Administrators group? –use a weak password? –install some new software? –use a floppy, USB drive or CD/DVD? –forget to: –patch Windows? –update antivirus? –turn on firewall?

Arm Yourself/Raise Alarm/Hide –Light the way –Be familiar with some (XP) tools to: determine baseline (MS Baseline Security Analyzer) detect problems (spyware/antivirus scan)‏ show user accounts (net user)‏ show privileges (net localgroup administrators)‏ show or kill processes (tasklist, taskkill; sysinternals procexp)‏ manage services (sc; services.msc)‏ show scheduled tasks (schtasks) list files by date of last modification (dir /od)‏ –Search for suspicious files and services on web –Should use external tools, like

Locate Source/Follow Evidence Where's the problem? Look in: c:\windows; c:\windows\system32 (dir /od)c:\windows registry (regedit) startup locations (sysinternals autoruns) network ports (netstat –anob; sysinternals tcpview) hidden files (dir /ah) recycle bin (dir /a) chronology of events in logs (eventvwr) Look for current activity as well as past

Observe/Confirm Suspicions Gather information –Watch processes (sysinternals procexp) look at strings in executable file look at strings in process memory –Watch files (sysinternals filemon) look at strings in executable files (sysinternals strings) –Watch network (sysinternals tcpview) look for listening ports look for foreign connections

Disarm/Contain/Remove Immediately close means of entry unplug network disable wireless remove all removable media check for hardware keystroke loggers Run full malware scan and remove (e.g., police) Search for observed entities on web –to find ways to remove manually, and remove Remove ways to re-infect at startup (e.g., unlocked) Restart after all of the above to kill all remaining

Block/Monitor Means of Entry Major entry points/vectors to block/monitor –users allowed on the system audit successful and failed logins –CP/Adm tools/Local Sec Set/Local Policies/Audit Policy monitor logs (eventvwr) do not provide administrator privileges to users disable accounts when not in use –network disable network when not in use (netsh interface set interface) firewall, with logging of attempts (netsh firewall) –removable media turn off autoruns of inserted media on-demand antivirus scan on read; review antivirus logs

What Was Removed, Damaged, Left Behind Make list of what you have before incident –have to keep up to date if upgrading OS –backups, file integrity tools (osiris) If possible, make offline copy of disk first and use it Compare current to saved list/backups Search web for suspicious files Ensure up to date antivirus (AV) signatures –Scan disk for viruses, possibly with a few AVs If root kit installed, might have to: –boot Helix/SysResCD/FIRE CD to mount read-only and inspect Windows drive

Replace, Clean/Fix, Remove Safest thing to do: format and re-install OS –disconnect from net first –use another computer to download patches apply patches –re-establish any blocks for entry done before Sometimes can replace files, remove services (sc), delete files, etc. –safest is to do it from Linux CD with Windows disk in read/write mode Don’t forget applications may allow re-infecting –might need to uninstall and re-install from original media

Conclusion Being more secure and staying that way is not simple Know your system Establish a baseline and keep it updated Use a script to investigate suspicious incidents Don’t blame your dog for not warning you

Credits –“Hotel California”: Eagles –Windows XP Start: Microsoft –“Stranger in My House”: Ronnie Milsap –“Who Are You?”: The Who –“Every Breath You Take”: The Police –“We’re All Alone”: Boz Scaggs –“Brahms Lullaby”: S. Stefano Protomartire