Download presentation
Presentation is loading. Please wait.
Published byJacob Phelps Modified over 9 years ago
1
Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign - CQURE: paula@idesign.net
2
Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary
3
The above means that every step leaves some trace! Windows 7 is designed to be used securely Achieved Evaluation Assurance Level (EAL) 4+ certification that meets Federal Information Processing Standard (FIPS) #140-2 Has C2 certification (Trusted Computer System Evaluation Criteria) Passed the Common Criteria Certification process
4
Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary
5
http://www.clearci.com Event Log Extendable Supported by API Plain text files (.log) Kernel traces Notifications SQL (ODBC) Application related
6
demo http://stderr.pl/cqure/tools.zip
7
demo Logs Less & More Advanced
8
http://www.batwinas.com Binaries are delivered With files from the Internet On the removable media Through LAN Through offline access By manipulating legitimate files Using vulnerabilities Buffer overflows
9
demo Replacing Files
10
demo "Vulnerabilities"
11
demo Services & ACLs
12
Cheating administrator Using automated ways Explorer Services Drivers DLLs Replacing files Path manipulation Injecting code Hooking calls
13
demo Services (In)Security
14
demo From A to Z - DLLs
15
demo Stuxnet Drivers
16
Problem: Too much information to control Solution: Select areas with high probability of infection DLLs Services Executables Drivers This attitude works as a first step
17
Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary
19
demo Protected Processes
20
Bypassing neighbored process objects Pointing the pointer nt!_eprocess ActiveProcessLinks manipulation Does not affect software operation Threads are still visible
21
demo Hidden Processes
22
http://www.lukechueh.com/
23
demo Hooking
25
demo Passwords In Operating System
26
Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary
27
Learn how to detect malicious situations Know your system when it is safe – you need a baseline If you detect a successful attack – do not try to fight Report the issue Format your drive Estimate the range of the attack Know how to recover your data, when necessary
28
Breakout Sessions (SIA203, SIA311, SIA304, SIA307) Find Me Later At TLC
29
Connect. Share. Discuss. http://europe.msteched.com Learning Microsoft Certification & Training Resources www.microsoft.com/learning TechNet Resources for IT Professionals http://microsoft.com/technet Resources for Developers http://microsoft.com/msdn
30
Evaluations http://europe.msteched.com/sessions Submit your evals online
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.