Windows XP File-Based Attacks Chris Dalbec & Chris Woodard.

Slides:



Advertisements
Similar presentations
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Advertisements

By Hiranmayi Pai Neeraj Jain
Are you ready for online learning? 20 questions to measure your readiness to study online at YTC College.
Tutorial 8: Developing an Excel Application
٠ Orientation ٠ Lingma Acheson Department of Computer and Information Science, IUPUI CSCI N331 VB.NET Programming.
AVG Internet Security 7.5 Product presentation.
Network applications Skills: none Concepts: client, server, automatic downloading of programs from Web servers, desktop or stand-alone application versus.
Converting Microsoft Office Documents Bill Weber E-Learning Systems Administrator E-Learning Operations.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
FrontPage 2003 Web Fundamentals Web Site Design. World Wide Web System based on Hypertext Transfer Protocol (HTTP) Provides access to information Information.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
XP 1 Using Common Features of Microsoft Office 2003 Rod Rodrigues.
XP Using Common Features of Microsoft Office Tutorial 1.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
HTMLMR.Mostafa badr1. Lesson 3 HTML Tags Lesson 2 Creating a HTML File Lesson 1: Hyper Text Markup Language (HTML) Basics Get Trained for a Better Future.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
HTML Overview for Proofreading. HTML layouts are divided into sections, and created in tables separating the images & content sections.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 Macros and VBA A macro is a set of instructions that tells Excel which commands to execute.
Internet Explorer Browsing & Windows XP Service Pack 2 What is Service Pack 2? The newest update for Windows XP which aims to make your computer more secure.
Grants Online Attaching Documents Step-by-Step Guide February 2013.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
Computer Concepts 2014 Chapter 7 The Web and .
Tutorial 11 Installing, Updating, and Configuring Software
INTRODUCTION TO FRONTPAGE. TOPICS TO BE DISCUSSED……….  Introduction Introduction  Features Features  Starting Front Page Starting Front Page  Components.
Technical Training Manual Adding & Updating Boring Information HTMLHTTPTLSTCP CSSFTPWANLAN DDoSCMSNATIP David White Web Developer / Systems Administrator.
COMP 1001: Introduction to Computers for Arts and Social Sciences The Internet and Open Source Monday, June 13, 2011.
——For running the Warehouse Mapper.. Download a VMware Workstation software. Website Link: detail/13808.html?qq- pf-to=pcqq.c2c.
Filtering Out Exploits By Learning Trusted Functionality Martin Rinard Department of Electrical Engineering and Computer Science Computer Science.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
ASP Introduction Y.-H. Chen International College Ming-Chuan University Fall, 2004.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Introduction to web development and HTML MGMT 230 LAB.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Lecture Note 1: Getting Started With ASP.  Introduction to ASP  Introduction to ASP An ASP file can contain text, HTML tags and scripts. Scripts in.
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
Using Macros in Minitab
1 In Microsoft Office 2007, click on the Windows button and select the Excel Options button on the lower right From Excel Options, select Trust Center.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
Uploading documents to the site Сlick “Add document” on the home page To send several files enable Add-on “Microsoft Office”
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Sky Advanced Threat Prevention
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
Software Essentials ICT 1 & 2. What is software?  software is the set of instructions stored inside a computer  These instructions tell the computer.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
KompoZer. What is it? A FREE product used to design websites A FREE product used to design websites A WYSIWYG HTML Editor A WYSIWYG HTML Editor –WYSIWYG:
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
XP Creating Web Pages with Microsoft Office
Introduction to ASP By “FlyingBono” 2009_01 By FlyingBono 2009_01
Jon Peppler, Menlo Security Channels
Printers.
Introduction to mobile app development Module 2 – Getting started with apps and App Studio Lance McCarthy.
Cloud Storage Services
HTML HYPERTEXT MARKUP LANGUAGE.
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
File Extension Mini-Lesson
ICT Word Processing Lesson 5: Revising and Collaborating on Documents
Презентация құру тәсілдері
Шаттық шеңбері.
Permission for this presentation is currently restricted. If you are not running Microsoft Office 2003 or an application that supports presentations with.
Presentation transcript:

Windows XP File-Based Attacks Chris Dalbec & Chris Woodard

Overview Why This Topic Why This Topic Background Background Macros Macros Other Files Other Files Lab Contents Lab Contents

Motivation File-Based attacks are popular over and peer to peer programs File-Based attacks are popular over and peer to peer programs New unpatched exploits New unpatched exploits Unaddressed in previous labs Unaddressed in previous labs

Macros Some of the most common windows programs allow for macros Some of the most common windows programs allow for macros Macros are mini programs ran inside Microsoft office documents for efficiency Macros are mini programs ran inside Microsoft office documents for efficiency Macros are can execute programs installed on windows Macros are can execute programs installed on windows

When Good Macros Go Bad One of the most popular internet attacks come from the downloading of macro enabled documents One of the most popular internet attacks come from the downloading of macro enabled documents Why are they so potentially dangerous Why are they so potentially dangerous

Other Files Malformed Word Doc Malformed Word Doc HTML Files HTML Files Vector Markup Language Vector Markup Language MSHTML MSHTML Windows Metafile Windows Metafile

Section 1 - Macros This portion of the lab will focus on macro attack This portion of the lab will focus on macro attack The student will: The student will: follow the procedure to produce a virus follow the procedure to produce a virus Inspect and investigate the created virus Inspect and investigate the created virus Run the virus exploit Run the virus exploit Review and test safe measure to prevent the exploit Review and test safe measure to prevent the exploit

Short video of Exploit Walrus Virus Editor in action!

Section 2 - Other Attacks Students will learn how to defend against HTML based Attacks HTML based Attacks Malformed Word Documents Malformed Word Documents WMF Attacks WMF Attacks

References

Questions?