CAP6135: Malware and Software Vulnerability Analysis Rootkits Cliff Zou Spring 2012.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

1 Introduction to Honeypot, Denial-of- Service, and Rootkit Cliff C. Zou CAP6135 Spring, 2010.
Operating System Security : David Phillips A Study of Windows Rootkits.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Students: Jacek Czeszewski and Marcos Verdini Rosa Professor: José Manuel Magalhães Cruz.
Windows Security and Rootkits Mike Willard January 2007.
Rootkits: Sneaky, Stealthy Toolboxes
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Windows Malware: Detection And Removal TechBytes Tim Ramsey.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Copyright John “Four” Flynn This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Root Kits and Windows Hardening Team BAM! Scott Amack Everett Bloch Maxine Major.
Chapter Nine Maintaining a Computer Part III: Malware.
1 Introduction to Honeypot, Denial-of- Service, and Rootkit Cliff C. Zou CAP6135 Spring, 2011.
Windows Systems and Signs of Compromise Prepared By: Rami Al_Khatib and Omar Al_Zyadat Supervised By: Dr. Lo’ai Tawlabeh New York Institute of Technology.
Copyright Microsoft Corp Dhiresh Salian Regional Information Security Manager Microsoft Corporation. Rootkit’s and protection against them.
Understanding Malware: Spyware, Viruses and Rootkits Steve Lamb IT Pro Evangelist for Security Technologies
Video Following is a video of what can happen if you don’t update your security settings! security.
SEC 309 Advanced Malware Cleaning Mark Russinovich Technical Fellow, Platform and Services Division Microsoft Corporation
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Endpoint Security 2.0: Next Generation Solutions & Why They Are Needed October 2008 Greg Valentine Solutions Engineer CoreTrace.
Protecting Your Computer & Your Information
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Computer Update March Just a Bit of an Update Equipment Security.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Rootkits in Windows XP  What they are and how they work.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
BlackHat Windows Security 2004 Data Hiding on a Live System by Harlan Carvey
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Return to the PC Security web page Lesson 5: Dealing with Malware.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Rootkits What are they? What do they do? Where do they come from?
RootKit By Parrag Mehta OUTLINE What is a RootKit ? Installation Types How do RootKits work ? Detection Removal Prevention Conclusion References.
Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Acknowledgement Some contents on honeypot are from  honeynets.ppt
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
Lecture 8 Rootkits Hoglund/Butler (Chapter 7-8). Avoiding detection Two ways rootkits can avoid detection –Modify execution path of operating system to.
Hyper-V Recovery Software Ideal Application to Get Data from VHD v2.1.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
For more information on Rouge, visit:
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
bitdefender virus protection
A+ Guide to Managing and Maintaining Your PC, 7e
Malware Creators Are Quite Clever, You Know...
A+ Guide to Managing and Maintaining Your PC, 7e
oad or wrong installation or Call
Malware aka- malicious software By: Ken Fogel
Fix to Quick Heal Update Error 1002 Call
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
BASIC SOFTWARE MAINTENANCE
Malicious Software Network security Master:Mr jangjou
WELCOME TO MY AVG ANTIVIRUS AVG is antivirus software that is known in the market from a long time period this particular antivirus software is known for.
Presentation transcript:

CAP6135: Malware and Software Vulnerability Analysis Rootkits Cliff Zou Spring 2012

The Evolution of Malware  Malware, including spyware, adware and viruses want to be hard to detect and/or hard to remove  Rootkits are a fast evolving technology to achieve these goals  Cloaking technology applied to malware  Not malware by itself  Example rootkit-based viruses:  Rootkit history  Appeared as stealth viruses  One of the first known PC viruses, Brain, was stealth  First “rootkit” appeared on SunOS in 1994  Replacement of core system utilities (ls, ps, etc.) to hide malware processes

Cloaking  Modern rootkits can cloak:  Processes  Services  TCP/IP ports  Files  Registry keys  User accounts  Several major rootkit technologies  User-mode API filtering  Kernel-mode API filtering  Kernel-mode data structure manipulation  Process hijacking  Visit for tools and informationwww.rootkit.com

 Attack user-mode system query APIs  Effect: listing system processes cannot see ‘malware.exe’ running process  Con: can be bypassed by going directly to kernel-mode APIs  Pro: can infect unprivileged user accounts  Examples: HackerDefender, Afx Taskmgr.exe Ntdll.dll Explorer.exe, Malware.exe, Winlogon.exe Rootkit Explorer.exe, Winlogon.exe user mode kernel mode User-Mode API Filtering

 Attack kernel-mode system query APIs  Cons:  Requires admin privilege to install  Difficult to write  Pro: very thorough cloak  Example: NT Rootkit Taskmgr.exe Ntdll.dll user mode kernel mode Rootkit Explorer.exe, Winlogon.exe Explorer.exe, Malware.exe, Winlogon.exe Kernel-Mode API Filtering

 Also called Direct Kernel Object Manipulation (DKOM)  Attacks active process data structure  Query API doesn’t see the process  Kernel still schedules process’ threads  Cons:  Requires admin privilege to install  Can cause crashes  Detection already developed  Pro: more advanced variations possible  Example: FU Explorer.exeMalware.exeWinlogon.exe Active Processes Kernel-Mode Data Structure Manipulation

 Hide inside a legitimate process  Con: doesn’t survive reboot  Pro: extremely hard to detect  Example: Code Red Explorer.exe Malware Process Hijacking

Detecting Rootkits  All cloaks have holes  Leave some APIs unfiltered  Have detectable side effects  Can’t cloak when OS is offline  Rootkit detection attacks holes  Cat-and-mouse game  Several examples  Microsoft Research Strider/Ghostbuster  RKDetect  Sysinternals RootkitRevealer  F-Secure BlackLight

 Perform a directory listing online and compare with secure alternate OS boot (see )  Offline OS is Windows PE, ERD Commander, BartPE dir /s /ah * > dirscan.txt windiff dirscanon.txt dirscanoff.txt  This won’t detect non-persistent rootkits that save to disk during shutdown Simple Rootkit Detection

RootkitRevealer Rootkit Windows API Raw file system, Raw Registry hive Filtered Windows API omits malware files and keys Malware files and keys are visible in raw scan RootkitRevealer  RootkitRevealer (RKR) runs online  RKR tries to bypass rootkit to uncover cloaked objects  All detectors listed do the same  RKR scans HKLM\Software, HKLM\System and the file system  Performs Windows API scan and compares with raw data structure scan

Demo  HackerDefender  HackerDefender before and after view of file system  Detecting HackerDefender with RootkitRevealer

 Unless you have specific uninstall instructions from an authoritative source:  Don’t rely on “rename” functionality offered by some rootkit detectors  It might not have detected all a rootkit’s components  The rename might not be effective Reformat the system and reinstall Windows! Dealing with Rootkits