Malware

T
Malware ,[object Object],[object Object]
Welcome to the zoo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a malware ? ,[object Object]
What it is good for ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
A recent illustration ,[object Object],[object Object],[object Object],[object Object]
The Malware Zoo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Virus ? ,[object Object],[object Object]
Some Virus Type ,[object Object],[object Object]
What is a trojan A trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer Wikipedia
What is rootkit  ,[object Object],[object Object]
What is a worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes  and do so without any user intervention.
Almost 30 years of Malware ,[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Melissa spread by email and share Knark rootkit made by creed demonstrate the first ideas love bug  vb script that abused a weakness in outlook Kernl intrusion by optyx gui and efficent hidding mechanims
Number of malware signatures Symantec report 2009
Malware Repartition Panda Q1 report  2009
Infection methods
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to Infect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overwriting malware Targeted Executable Malware Malware
prepending malware Targeted Executable Malware Infected host Executable Malware
appending malware Targeted Executable Malware Infected host Executable Malware
Cavity malware Targeted Executable Infected host Executable Malware Malware
Multi-Cavity malware Targeted Executable Malware Malware Malware Malware
Packers Malware Infected host Executable Packer Payload
Packer functionalities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auto start ,[object Object],[object Object],[object Object],[object Object],[object Object]
Auto start cont. ,[object Object],[object Object],[object Object],[object Object]
Unix autostart ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Macro virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document based malware ,[object Object],[object Object],[object Object]
Userland root kit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subverting the Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kernel rootkit PS KERNEL Hardware :  HD, keyboard, mouse, NIC, GPU P1 P2 P3 P3 rootkit
Subverting techniques ,[object Object],[object Object],[object Object]
Windows Kernel P1 P2 Pn Csrss.exe Win32 subsystem DLLs User32.dll, Gdi32.dll and Kernel32.dll Other Subsytems (OS/2 Posix) Ntdll.dll ntoskrnl.exe Hardware Abstraction Layer (HAL.dll) Hardware Underlying kernel Executive
Kernel Device driver P2 Win32 subsystem DLLs Ntdll.dll ntoskrnl.exe Interrupt Hook System service dispatcher System service dispatch table Driver Overwriting functions Driver Replacing Functions New pointer A C B
MBR/Bootkit ,[object Object]
BIOS MBR VBS NT Boot Sector BOOTMGR.EXE WINLOAD.EXE Windows 7 kernel HAL.DLL
Vboot ,[object Object],[object Object],[object Object],[object Object]
Hypervisor rootkit Target OS  Hardware App App
Hypervisor rootkit Target OS  Hardware App App Virtual machine monitor  Host OS  Rogue app
Propagation Vector Vector
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shared folder
Email propagation ,[object Object]
Valentine day ... ,[object Object]
Email again Symantec 2009
Fake codec
Fake antivirus ,[object Object]
Hijack you browser ,[object Object]
Fake page ! ,[object Object]
P2P Files ,[object Object],[object Object]
Backdoor
Basic InfectedHost Attacker TCP
Reverse InfectedHost Attacker TCP
covert InfectedHost Attacker ICMP
Rendez vous backdoor InfectedHost Attacker RDV Point
Bestiary
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adware
BackOrifice ,[object Object],[object Object]
Netbus ,[object Object],[object Object]
Symantec pcAnywhere
Browser Toolbar ...
Toolbar again
Ransomware ,[object Object],[object Object],[object Object],To unlock you need to send an SMS with the text4121800286to the number3649Enter the resulting code:Any attempt to reinstall the system may lead to loss of important information and computer damage from pandalab blog
Detection
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-virus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Impossibility result ,[object Object]
Impossibility result ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus signature ,[object Object],[object Object]
Heuristics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Checksum ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sandbox analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with Packer  ,[object Object],[object Object],[object Object]
Worms
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost of worm attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Worm (First major attack) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some historical worms of note Kienzle and Elder Worm Date Distinction Morris 11/88 Used multiple vulnerabilities, propagate to “nearby” sys ADM 5/98 Random scanning of IP address space Ramen 1/01 Exploited three vulnerabilities Lion 3/01 Stealthy, rootkit worm Cheese 6/01 Vigilante worm that secured vulnerable systems Code Red 7/01 First sig Windows worm; Completely memory resident Walk 8/01 Recompiled source code locally Nimda 9/01 Windows worm: client-to-server, c-to-c, s-to-s, … Scalper 6/02 11 days after announcement of vulnerability; peer-to-peer network of compromised systems Slammer 1/03 Used a single UDP packet for explosive growth
Increasing propagation speed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Code Red ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Code Red of July 13 and July 19 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Infection rate
Measuring activity: network telescope ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spread of Code Red ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Slides: Vern Paxson
Code Red 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Striving for Greater Virulence: Nimda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks Slides: Vern Paxson
How do worms propagate? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
slammer ,[object Object],[object Object],[object Object],[object Object]
Slammer propagation
Number of scan/sec
Packet loss
A server view
Consequences ,[object Object],[object Object],[object Object],[object Object]
Worm Detection and Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for automation ,[object Object],[object Object],months days hrs mins secs Contagion Period Signature Response Period 1990 Time 2005  Slide: Carey Nachenberg, Symantec Program Viruses Macro Viruses E-mail Worms Network Worms Flash Worms Pre- automation Post- automation Contagion Period Signature Response Period
Signature inference ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signature inference ,[object Object],[object Object],Slide: S Savage
Content sifting ,[object Object],[object Object],[object Object],[object Object],[object Object],Slide: S Savage
Observation: High-prevalence strings are rare (Stefan Savage, UCSD *) Only 0.6%  of the 40 byte  substrings  repeat more than 3 times  in a minute
The basic algorithm (Stefan Savage, UCSD *) Address  Dispersion  Table   Sources  Destinations Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (B) 1 (A) Address  Dispersion  Table   Sources  Destinations 1 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 1 (B) 1 (A) Address  Dispersion  Table   Sources  Destinations 1 1 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 2 (B,D) 2 (A,B) Address  Dispersion  Table   Sources  Destinations 1 2 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 3 (B,D,E) 3 (A,B,D) Address  Dispersion  Table   Sources  Destinations 1 3 Prevalence  Table Detector in network A B cnn.com C D E
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(Stefan Savage, UCSD *)
1 sur 111

Recommandé

What is malware par
What is malwareWhat is malware
What is malwareMalcolm York
2.3K vues26 diapositives
Computer Malware and its types par
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
1K vues19 diapositives
MALWARE AND ITS TYPES par
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
518 vues18 diapositives
Malware and security par
Malware and securityMalware and security
Malware and securityGurbakash Phonsa
4.6K vues41 diapositives
Malware par
MalwareMalware
MalwareAnoushka Srivastava
1.6K vues20 diapositives
Introduction to Malware par
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
7.7K vues35 diapositives

Contenu connexe

Tendances

Types of malware par
Types of malwareTypes of malware
Types of malwaretechexpert2345
5.5K vues14 diapositives
Ransomware par
RansomwareRansomware
RansomwareAkshita Pillai
12.6K vues29 diapositives
Malware ppt final.pptx par
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
390 vues22 diapositives
Trojan horse par
Trojan horseTrojan horse
Trojan horseGaurang Rathod
12.9K vues16 diapositives
How To Protect From Malware par
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
1.7K vues23 diapositives
Trojan Horse Presentation par
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
21.3K vues10 diapositives

Tendances(20)

Trojan Horse Presentation par ikmal91
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal9121.3K vues
What is a virus and anti virus par Leonor Costa
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa3.6K vues
Types of computer viruses par shimaBarason
Types of computer viruses Types of computer viruses
Types of computer viruses
shimaBarason351 vues
seminar report on What is ransomware par Jawhar Ali
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali2.6K vues
introduction to malwares,virus,trojan horse par Spandan Patnaik
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik2.8K vues
Program and System Threats par Reddhi Basu
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu7K vues
Torjan horse virus par sumitra22
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra221.5K vues

En vedette

bulliying par
bulliyingbulliying
bulliyingMaryangeles2015
637 vues3 diapositives
Anti bullying ra 10627 final ping par
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
15K vues22 diapositives
Malware par
MalwareMalware
Malwaregonzalosantomemolanes
3.4K vues10 diapositives
Malware- Types, Detection and Future par
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
6.2K vues15 diapositives
Malware par
Malware Malware
Malware javierholgueras
7.6K vues105 diapositives
Viruses andthreats@dharmesh par
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmeshDharmesh Kumar Sharma
1.2K vues48 diapositives

En vedette(20)

Anti bullying ra 10627 final ping par XFactor Umitz
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
XFactor Umitz15K vues
Malware- Types, Detection and Future par karanwayne
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
karanwayne6.2K vues
Introduction to Malware Analysis par Andrew McNicol
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol8.4K vues
Computer Malware par aztechtchr
Computer MalwareComputer Malware
Computer Malware
aztechtchr26.4K vues
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T... par Sam Bowne
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne6.7K vues
Online Ethics and Etiquette par JessamenTino21
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino2125.8K vues
Lesson 2 Online Safety, Security, Ethics and Etiquette par Lea Rodriguez
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lea Rodriguez15K vues
Chapter 3 Computer Crimes par Mar Soriano
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano13.5K vues
Cloud Camp: Infrastructure as a service advance workloads par Asaf Nakash
Cloud Camp: Infrastructure as a service advance workloadsCloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloads
Asaf Nakash612 vues
Oracle cloud, private, public and hybrid par Johan Louwers
Oracle cloud, private, public and hybridOracle cloud, private, public and hybrid
Oracle cloud, private, public and hybrid
Johan Louwers2.2K vues
Docker containerization cookbook par Pascal Louis
Docker containerization cookbookDocker containerization cookbook
Docker containerization cookbook
Pascal Louis1.6K vues
100 blue mix days technical training par Ajit Yohannan
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
Ajit Yohannan12.4K vues
Challenges and outlook with Big Data par IJCERT JOURNAL
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data
IJCERT JOURNAL688 vues
Sfeldman bbworld 07_going_enterprise (1) par Steve Feldman
Sfeldman bbworld 07_going_enterprise (1)Sfeldman bbworld 07_going_enterprise (1)
Sfeldman bbworld 07_going_enterprise (1)
Steve Feldman562 vues

Similaire à Malware

virus.ppt par
virus.pptvirus.ppt
virus.pptNabyenduMukherjee1
12 vues21 diapositives
Virus par
VirusVirus
VirusNitin Dhiman
450 vues33 diapositives
Computer Worms par
Computer WormsComputer Worms
Computer Wormssadique_ghitm
14.2K vues20 diapositives
5 worms and other malware par
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
1.7K vues19 diapositives
Computer Viruses and Classification lecture slides ppt par
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
272 vues27 diapositives
Computer Virus par
Computer VirusComputer Virus
Computer VirusDebraj Chatterjee
1.1K vues16 diapositives

Similaire à Malware(20)

5 worms and other malware par drewz lin
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin1.7K vues
Computer Viruses and Classification lecture slides ppt par Osama Yousaf
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf272 vues
RRB JE Stage 2 Computer and Applications Questions Part 5 par CAS
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS2.8K vues
Malware and Anti-Malware Seminar by Benny Czarny par OPSWAT
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT3.6K vues
Computer virus par omroyal
Computer virusComputer virus
Computer virus
omroyal370 vues
Virus worm trojan par 100701982
Virus worm trojanVirus worm trojan
Virus worm trojan
1007019828.1K vues
(Training) Malware - To the Realm of Malicious Code par Satria Ady Pradana
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Virus worm trojan par 100701982
Virus worm trojanVirus worm trojan
Virus worm trojan
1007019821.2K vues

Plus de Tuhin_Das

Workshop Assembler par
Workshop AssemblerWorkshop Assembler
Workshop AssemblerTuhin_Das
4.6K vues19 diapositives
Aop2007 par
Aop2007Aop2007
Aop2007Tuhin_Das
674 vues17 diapositives
SQL par
SQLSQL
SQLTuhin_Das
6.9K vues60 diapositives
Operating System par
Operating SystemOperating System
Operating SystemTuhin_Das
433 vues8 diapositives
Operating System par
Operating SystemOperating System
Operating SystemTuhin_Das
355 vues8 diapositives
Clientserver Presentation par
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
29.6K vues19 diapositives

Plus de Tuhin_Das(14)

Workshop Assembler par Tuhin_Das
Workshop AssemblerWorkshop Assembler
Workshop Assembler
Tuhin_Das4.6K vues
Operating System par Tuhin_Das
Operating SystemOperating System
Operating System
Tuhin_Das433 vues
Operating System par Tuhin_Das
Operating SystemOperating System
Operating System
Tuhin_Das355 vues
Clientserver Presentation par Tuhin_Das
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das29.6K vues
Malware Trends Developments par Tuhin_Das
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
Tuhin_Das1.3K vues
GPS DOCUMENT par Tuhin_Das
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENT
Tuhin_Das6.5K vues
Presentation On Gps par Tuhin_Das
Presentation On GpsPresentation On Gps
Presentation On Gps
Tuhin_Das1.1K vues
DOCS ON NETWORK SECURITY par Tuhin_Das
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
Tuhin_Das1.8K vues
Brain Machine Interfacenew par Tuhin_Das
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine Interfacenew
Tuhin_Das1.6K vues
Laser & Its Application par Tuhin_Das
Laser & Its ApplicationLaser & Its Application
Laser & Its Application
Tuhin_Das80.1K vues
A NETWORK SECURITY APPROACH USING RSA. par Tuhin_Das
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das2.1K vues

Malware

Notes de l'éditeur

  1. more like autoexec.bat etc
  2. Crss.exe Client/server run time sub system -> used to run a keep state of process => can be query in userland Ntdll -> convert api call to kernel call NTll do call gate jumps Executive dispatch syscall to the underlying kernel SSDT system service dispatch table HAL.dll hardware abstraction Transition using the int0x2E interrupt
  3. A Overwrite B Redirect by patching the service dispatch table C Redirect the interrupt
  4. VBS : volume boot sector MBR: master boot record white unknown green - 16 bits red 32 bits blue 64 bits
  5. Blue pill (Joanna) SubVirt (Microsoft)
  6. Blue pill (Joanna) injection method using raw disk access from user mode patched need a signed driver
  7. Sir Dystic Cult of the dead cow demonstrate the vuln of 98
  8. used to plant child pornography on the work computer of Magnus Eriksson law scholar at Lund University. The 3,500 images n lost his research position Fled the country acquitted in 2004
  9. Speak of sending mail