SlideShare une entreprise Scribd logo
1  sur  67
Télécharger pour lire hors ligne
MALICIOUS	
  SOFTWARE	
  
    Raja	
  M.	
  Khurram	
  Shahzad	
  




                                           1!
Overview	
  
— IntroducAon	
  
— Virus	
  
— Worm	
  

— Other	
  Malicious	
  SoEware	
  
  o 	
  	
  Backdoor/Trapdoor	
  
  o 	
  	
  Logic	
  Bomb	
  
  o 	
  	
  Trojan	
  Horse	
  

— DDoS	
  ANack	
  
  o 	
  	
  DDos	
  DescripAon	
  
  o 	
  	
  ConstrucAon	
  of	
  ANack	
  



                                                            2!
Program DefiniAon	
  
A	
  computer	
  program	
  tells	
  a	
  computer	
  	
  
              what	
  to	
  do	
  and	
  how	
  to	
  do	
  it	
  
	
  
•  Computer	
   viruses,	
   network	
   worms,	
   	
   and       	
  
     Trojan	
  Horse	
  are	
  	
  
                 computer	
  programs. 	
  



	
  	
  
                                                                          3!
Malicious	
  soEware	
  ?	
  
•  Malicious	
  SoEware	
  (Malware)	
  is	
  a	
  soEware	
  that	
  is	
  included	
  or	
  
     inserted	
  in	
  a	
  system	
  for	
  harmful	
  purposes.	
  
	
  
OR	
  	
  
	
  
•  A	
   Malware	
   is	
   a	
   set	
   of	
   instrucAons	
   that	
   run	
   on	
   your	
   computer	
  
     and	
  make	
  your	
  system	
  do	
  something	
  that	
  an	
  aNacker	
  wants	
  it	
  
     to	
  do.	
  
	
  




                                                                                                                 4!
The	
  Malware	
  Zoo	
  
•  Virus        	
  	
  
•  Worms	
  
•  Logic	
  Bomb	
  
•  Trojan	
  horse	
  
•  Zoombie	
  
•  Scareware	
  
•  Adware	
  
•  Backdoor	
  /	
  Trapdoors	
  



                                                       5!
Taxonomy	
  of	
  Malicious	
  Programs	
  
                                  Malicious Programs	




               Need Host Program	

                       Independent	





Trapdoors	

     Logic         Trojan	

     Viruses	

          Zombies	

   Worms	

    	

          Bombs	

      Horses	

        	

                 	

         	





               Most current malicious code mixes all capabilities!                       6!
What	
  it	
  is	
  good	
  for	
  ?	
  
•  Steal	
  personal	
  informaAon	
  

•  Delete	
  files	
  

•  Click	
  fraud	
  	
  

•  Steal	
  soEware	
  serial	
  numbers	
  




                                                                7!
What	
  to	
  Infect	
  
•  Executable	
  

•  Interpreted	
  file	
  

•  Kernel	
  

•  Service	
  

•  Master	
  Boot	
  Record	
  	
  



                                                  8!
Virus	
  
•  Self-­‐replicaAng	
   code,	
   aNaches	
   itself	
   to	
   another	
   program	
  
   and	
  executes	
  secretly	
  when	
  the	
  host	
  program	
  is	
  executed.	
  

•  No	
  Hidden	
  acAon	
  
     –  Generally	
  tries	
  to	
  remain	
  undetected,	
  but	
  what	
  about	
  acAviAes,	
  
        such	
  as	
  deleted	
  files	
  ?	
  




                                                                                                     9!
Parts	
  of	
  a	
  Virus
                                                 	
  
•  Three	
  Parts	
  
    –  InfecAon	
   Mechanism:	
   The	
   means	
   by	
   which	
   a	
   virus    	
  
       spreads,	
   enabling	
   it	
   to	
   replicate,	
   also	
   referred	
   as
                                                                                     	
  
       InfecAon	
  Vector.	
  	
  

     –  Trigger:	
  The	
  event	
  or	
  condiAon	
  that	
  determines	
  when	
  
        the	
  payload	
  is	
  acAvated	
  or	
  delivered.	
  	
  

     –  Payload:	
   The	
   payload	
   may	
   involve	
   damage	
   or	
   may	
  
        involve	
  benign	
  but	
  NOTICEABLE	
  acAvity.	
  	
  
Phases	
  –	
  Life	
  Cycle	
  
•  Dormant	
  phase	
  -­‐	
  the	
  virus	
  is	
  idle	
  

•  Propaga1on	
  phase	
  -­‐	
  the	
  virus	
  places	
  an	
  idenAcal	
  copy	
  of	
  
   itself	
  into	
  other	
  programs	
  

•  Triggering	
  phase	
  –	
  the	
  virus	
  is	
  acAvated	
  to	
  perform	
  the	
  
   funcAon	
  for	
  which	
  it	
  was	
  intended	
  

•  Execu1on	
  phase	
  –	
  	
  
   the	
  funcAon	
  is	
  performed	
  


                                                                                              11!
Virus	
  Structure	
  




                         12!
OperaAon	
  rouAne	
  
•  Operates	
   when	
   infected	
   code	
   executed	
   (execuAon	
  
   sequence)	
  
     –  Jump	
  to	
  Main	
  Virus	
  program	
  
     –  If	
  spread	
  (infecAon)	
  condiAon	
  then	
  
            {	
  
                         	
  For	
  target	
  files	
  :	
  if	
  not	
  infected,	
  then	
  alter	
  file	
  to	
  include	
  virus	
  
             }	
  
     –  Perform	
  malicious	
  acAon	
  
     –  Transfer	
  control	
  back	
  
     –  Execute	
  normal	
  program	
  


•  If	
   the	
   infecAon	
   phase	
   is	
   rapid,	
   user	
   will	
   not	
   noAce	
   any	
  
   difference	
  between	
  the	
  execuAon	
  of	
  infected	
  program	
  and	
  
   uninfected	
  program.	
  	
  
Types	
  of	
  Viruses	
  
•  On	
  the	
  basis	
  of	
  target	
  

•  Boot	
   Sector	
   Infector:	
   Infects	
   master	
   boot	
   record	
   /	
   boot	
   record	
   (boot	
  
   sector)	
  of	
  a	
  disk	
  and	
  spreads	
  when	
  a	
  system	
  is	
  booted	
  with	
  an	
  infected	
  
   disk	
  (original	
  DOS	
  viruses).	
  They	
  are	
  Memory-­‐resident	
  Virus.	
  	
  	
  


•  File	
  Infector	
  :	
  Infects	
  executable	
  files,	
  they	
  are	
  also	
  called	
  Parasi1c	
  Virus	
  
   as	
  they	
  aNach	
  their	
  self	
  to	
  executable	
  files	
  as	
  part	
  of	
  their	
  code.	
  	
  Runs	
  
   whenever	
  the	
  host	
  program	
  is	
  executed.	
  	
  


•  Macro	
   Virus	
   –Infects	
   files	
   with	
   macro	
   code	
   that	
   is	
   interpreted	
   by	
   the	
  
   relevant	
  applicaAon,	
  such	
  as	
  doc	
  or	
  excel	
  files.	
  	
  
	
  


                                                                                                                            14!
Types	
  of	
  Viruses	
  
•  On	
  the	
  basis	
  of	
  concealment	
  strategy	
  

•  Encrypted	
  Virus	
  –	
  A	
  porAon	
  of	
  virus	
  creates	
  a	
  random	
  encrypAon	
  key	
  and	
  
   encrypts	
   the	
   remainder	
   of	
   the	
   virus.	
   The	
   key	
   is	
   stored	
   with	
   the	
   virus.	
  
   When	
  the	
  virus	
  replicates,	
  a	
  different	
  random	
  key	
  is	
  generated.	
  	
  

•  Stealth	
  Virus	
  -­‐	
  explicitly	
  designed	
  to	
  hide	
  from	
  Virus	
  Scanning	
  programs.	
  

•  Polymorphic	
  Virus	
  -­‐	
  mutates	
  with	
  every	
  new	
  host	
  to	
  prevent	
  signature	
  
   detecAon,	
  signature	
  detecAon	
  is	
  useless.	
  	
  

•  Metamorphic	
  Virus	
  –	
  Rewrites	
  itself	
  completely	
  with	
  every	
  new	
  host,	
  may	
  
   change	
  their	
  behavior	
  and	
  appearance.	
  	
  
	
  
	
  


                                                                                                                            15!
Recent	
  addiAon:	
  
                             	
  Email	
  Virus	
  
•  Moves	
   around	
   in	
   e-­‐mail	
   messages,	
   triggered	
   when	
   user	
  
       opens	
  aNachment	
  
•  Do	
  local	
  damages	
  on	
  the	
  user’s	
  system	
  
•  Propagates	
  very	
  quickly	
  
•  Replicates	
  itself	
  by	
  automaAcally	
  mailing	
  itself	
  to	
  dozens	
  	
  
   	
  of	
  people	
  in	
  the	
  vicAm’s	
  	
  
       e-­‐mail	
  address	
  book	
  
	
  


                                                                                         16!
Examples	
  of	
  risky	
  file	
  types	
  
•  The	
  following	
  file	
  types	
  should	
  never	
  be	
  opened	
  if…	
  
    –  .EXE	
  
    –  .PIF	
  
    –  .BAT	
  
    –  .VBS	
  
    –  .COM	
  




                                                                                    17!
Viruses	
  PropagaAon	
  
•  Virus	
  wriNen	
  in	
  some	
  language	
  e.g.	
  C,	
  C++,	
  Assembly	
  
   etc.	
  

•  Inserted	
  into	
  another	
  program	
  
     –  use	
  tool	
  called	
  a	
  “dropper”	
  


•  Virus	
  dormant	
  unAl	
  program	
  executed	
  
     –  then	
  infects	
  other	
  programs	
  
     –  eventually	
  executes	
  its	
  “payload”	
  




                                                                                     18!
Viruses	
  PropagaAon	
  




•      An	
  executable	
  program	
  
•      With	
  a	
  virus	
  at	
  the	
  front	
  (File	
  size	
  is	
  increased)	
  
•      With	
  the	
  virus	
  at	
  the	
  end	
  (File	
  size	
  is	
  increased)	
  
•      With	
  a	
  virus	
  spread	
  over	
  free	
  space	
  within	
  program	
  
	
  
                                                                                           19!
Viruses	
  PropagaAon	
  




(a)	
  A	
  program	
  
(b)	
  Infected	
  	
  program	
  
(c)	
  Compressed	
  infected	
  program	
  
(d)	
  Encrypted	
  virus	
  
(e)	
  Compressed	
  virus	
  with	
  encrypted	
  compression	
  code	
  
                                                                             20!
AnA-­‐virus	
  
•  It	
   is	
   not	
   possible	
   to	
   build	
   a	
   perfect	
   virus/malware	
  
   detector.	
  
•  Analyze	
  system	
  behavior	
  
•  Analyze	
  binary	
  to	
  decide	
  if	
  it	
  a	
  virus	
  
•  Type	
  :	
  
   –  Scanner	
  
   –  Real	
  Ame	
  monitor	
  




                                                                                             21!
AnA-­‐virus	
  
•  Scanners	
  
    –  First	
  GeneraAon,	
  relied	
  on	
  signature.	
  	
  
    –  Second	
   GeneraAon,	
   relied	
   on	
   heurisAc	
   rules	
   or	
   integrity	
  
       checking	
  (e.g.	
  checksum	
  appended	
  to	
  a	
  program).	
  


•  Real	
  Ame	
  Monitors	
  
    •  Third	
   GeneraAon,	
   memory	
   resident	
   and	
   idenAfy	
   virus	
   by	
   its	
  
       acAons	
  (behaviour).	
  
    •  Fourth	
  GeneraAon,	
  combinaAon	
  of	
  different	
  capabiliAes.	
  	
  




                                                                                                       22!
Worm	
  
A computer worm is a self-replicating computer
virus. It uses a network to send copies of itself to
other nodes       and do so without any user
intervention.!




                                                       23!
Comparision	
  of	
  Worm	
  Features	
  
 1)	
  	
  Computer	
  Virus:	
     • Needs	
  a	
  host	
  file	
  
                                    • Copies	
  itself	
  
                                    • Executable	
  

 2)	
  	
  Network	
  Worm:	
       • No	
  host	
  (self-­‐contained)	
  	
  
                                    • Copies	
  itself	
  	
  	
  
                                    • Executable	
  

  3)	
  	
  Trojan	
  Horse:	
      • 	
  No	
  host	
  (self-­‐contained)	
  
                                    • Does	
  not	
  copy	
  itself	
  
                                    • Imposter	
  Program	
                      24!
Worm:	
  History	
  
•  Runs	
  independently	
  	
  
     –  Does	
  not	
  require	
  a	
  host	
  program	
  


•  Propagates	
  a	
  fully	
  working	
  version	
  of	
  itself	
  to	
  other	
  machines	
  

—  History	
  
     ◦  Morris	
  worm	
  was	
  one	
  of	
  the	
  first	
  worms	
  distributed	
  over	
  Internet	
  
     —  Two	
  examples	
  	
  
           ◦  Morris	
  –	
  1998,	
  
           ◦  Slammer	
  –	
  2003	
  




                                                                                                            25!
Worm	
  OperaAon	
  
•  Worm	
  has	
  similar	
  phases	
  like	
  a	
  virus:	
  
    •  Dormant	
  (inacAve;	
  	
  rest)	
  

    •  PropagaAon	
  
          •  Search	
  for	
  other	
  systems	
  to	
  infect	
  
          •  Establish	
  connecAon	
  to	
  target	
  remote	
  system	
  
          •  Replicate	
  self	
  onto	
  	
  
             remote	
  system	
  


     –  Triggering	
  

     –  ExecuAon	
  


                                                                              26!
Morris	
  Worm	
  
•  Best	
  known	
  classic	
  worm	
  

•  Released	
  by	
  Robert	
  Morris	
  in	
  1988	
  

•  Targeted	
  Unix	
  systems	
  
•  Using	
  several	
  propagaAon	
  techniques	
  

•  If	
  any	
  aNack	
  succeeds	
  then	
  replicated	
  self	
  




                                                                      27!
Slammer	
  (Sapphire)	
  Worm	
  
•  When	
  
    •  Jan	
  25	
  2003	
  

•  How	
  
    •  Exploit	
  Buffer-­‐overflow	
  with	
  MS	
  SQL	
  

•  Random	
  Scanning	
  
    •  Randomly	
  select	
  IP	
  addresses	
  

•  Cost	
  
    •  Caused	
  ~	
  $2.6	
  Billion	
  in	
  damage	
  
    	
  


                                                             28!
Slammer	
  Scale	
  




The	
  diameter	
  of	
  each	
  circle	
  is	
  a	
  funcAon	
  of	
  the	
  number	
  of	
  infected	
  machines,	
  so	
  
large	
   circles	
   visually	
   under	
   represent	
   the	
   number	
   of	
   infected	
   cases	
   in	
   order	
   to	
  
minimize	
  overlap	
  with	
  adjacent	
  locaAons	
  	
  


                                                                                                                                      29!
The	
  worm	
  itself	
  …	
  
—  System	
  load	
  
   ◦  InfecAon	
  generates	
  a	
  number	
  of	
  processes	
  
   ◦  Password	
  cracking	
  uses	
  lots	
  of	
  resources	
  
   ◦  Thousands	
  of	
  systems	
  were	
  shut	
  down	
  


•  Tries	
  to	
  infect	
  as	
  many	
  other	
  hosts	
  as	
  possible	
  
   –  When	
  worm	
  successfully	
  connects,	
  leaves	
  a	
  child	
  to	
  conAnue	
  the	
  infecAon	
  
      while	
  the	
  parent	
  keeps	
  trying	
  new	
  hosts	
  
   –  find	
  targets	
  using	
  several	
  mechanisms:	
  'netstat	
  -­‐r	
  -­‐n‘,	
  /etc/hosts,	
  	
  


•  Worm	
  DO	
  NOT:	
  
   –  Delete	
   system's	
   files,	
   modify	
   exisAng	
   files,	
   install	
   Trojan	
   horses,	
   record	
   or	
  
      transmit	
  decrypted	
  passwords,	
  capture	
  super	
  user	
  privileges	
  



                                                                                                                                30!
Backdoor	
  or	
  Trapdoor	
  
—  Secret	
  entry	
  point	
  into	
  a	
  program	
  
—  Allows	
  those	
  who	
  know	
  access	
  by	
  passing	
  usual	
  security	
  
    procedures	
  
—  Remains	
  hidden	
  to	
  casual	
  inspecAon	
  
—  Can	
  be	
  a	
  new	
  program	
  to	
  be	
  installed	
  
—  Can	
  modify	
  an	
  exisAng	
  program	
  
—  Trap	
  doors	
  can	
  provide	
  access	
  to	
  a	
  system	
  for	
  
    unauthorized	
  procedures	
  
—  Very	
  hard	
  to	
  block	
  in	
  O/S	
  




                                                                                         31!
Trap	
  Door	
  Example	
  




(a)	
  Normal	
  code.	
  	
  
(b)	
  Code	
  with	
  a	
  trapdoor	
  inserted	
  

                                                       32!
Logic	
  Bomb	
  
•  One	
  of	
  oldest	
  types	
  of	
  malicious	
  soEware	
  
•  Piece	
  of	
  code	
  that	
  executes	
  itself	
  when	
  pre-­‐defined	
  condiAons	
  are	
  
   met	
  
•  Logic	
  Bombs	
  that	
  execute	
  on	
  certain	
  days	
  are	
  known	
  as	
  Time	
  
   Bombs	
  
•  AcAvated	
  when	
  specified	
  condiAons	
  met	
  
    –  E.g.,	
  presence/absence	
  of	
  some	
  file	
  
    –  parAcular	
  date/Ame	
  
    –  parAcular	
  user	
  
•  When	
  triggered	
  typically	
  damage	
  system	
  
    –  modify/delete	
  files/disks,	
  halt	
  machine,	
  etc.	
  


                                                                                                   33!
Tracing	
  Logic	
  Bombs	
  
•  Searching - Even the most experienced programmers have trouble
   erasing all traces of their code

•  Knowledge - Important to understand the underlying system
   functions, the hardware, the hardware/software/firmware/
   operating system interface, and the communications functions
   inside and outside the computer

•  Example of benign logical fun
       –  http://googletricks.com/top-25-fun-google-tricks/
       –  Type zerg rush in google
	
  



                                                                    34!
Trojan	
  Horse	
  




                      35!
Trojan	
  Horse	
  
•  Trojan	
  horse	
  is	
  a	
  malicious	
  program	
  	
  that	
  is	
  designed	
  as	
  
     authenAc,	
  	
  real	
  and	
  genuine	
  soEware.	
  	
  
	
  
•  Like	
  the	
  giE	
  horse	
  leE	
  outside	
  the	
  gates	
  of	
  Troy	
  by	
  the	
  
     Greeks,	
   Trojan	
   Horses	
   appear	
   to	
   be	
   useful	
   or	
  
     interesAng	
   to	
   an	
   unsuspecAng	
   user,	
   but	
   are	
   actually	
  
     harmful.	
  




                                                                                                  36!
Trojan	
  Percentage	
  




                           37!
What	
  Trojans	
  can	
  do	
  ?	
  
•  Erase	
  or	
  overwrite	
  data	
  on	
  a	
  computer	
  
•  Spread	
  other	
  viruses	
  or	
  install	
  a	
  backdoor.	
  In	
  this	
  case	
  the	
  
   Trojan	
  horse	
  is	
  called	
  a	
  'dropper'.	
  
•  Sevng	
  up	
  networks	
  of	
  zombie	
  computers	
  in	
  order	
  to	
  launch	
  
   DDoS	
  aNacks	
  or	
  send	
  Spam.	
  

•  Logging	
  keystrokes	
  to	
  steal	
  informaAon	
  such	
  as	
  passwords	
  
   and	
  credit	
  card	
  numbers	
  (known	
  as	
  a	
  key	
  logger)	
  
•  Phish	
  for	
  bank	
  or	
  other	
  account	
  details,	
  which	
  can	
  be	
  used	
  for	
  
   criminal	
  acAviAes.	
  
•  Or	
  simply	
  to	
  destroy	
  data	
  
•  Mail	
  the	
  password	
  file.	
  
	
  

                                                                                                         38!
How	
  can	
  you	
  be	
  infected	
  ?	
  
•  Websites:	
  You	
  can	
  be	
  infected	
  by	
  visiAng	
  a	
  rogue	
  website.	
  
   Internet	
   Explorer	
   is	
   most	
   oEen	
   targeted	
   by	
   makers	
   of	
  
   Trojans	
  and	
  other	
  pests.	
  Even	
  using	
  a	
  secure	
  web	
  browser,	
  
   such	
  as	
  Mozilla's	
  Firefox,	
  if	
  Java	
  is	
  enabled,	
  your	
  computer	
  
   has	
  the	
  potenAal	
  of	
  receiving	
  a	
  Trojan	
  horse.	
  

•  Instant	
   message:	
   Many	
   get	
   infected	
   through	
   files	
   sent	
  
   through	
  various	
  messengers.	
  This	
  is	
  due	
  to	
  an	
  extreme	
  lack	
  
   of	
   security	
   in	
   some	
   instant	
   messengers,	
   such	
   of	
   AOL's	
  
   instant	
  messenger.	
  

•  E-­‐mail:	
   ANachments	
   on	
   e-­‐mail	
   messages	
   may	
   contain	
  
   Trojans.	
  	
  Trojan	
  horses	
  via	
  SMTP.	
  


                                                                                                 39!
Sample	
  Delivery	
  
•  ANacker	
  will	
  aNach	
  the	
  Trojan	
  to	
  an	
  e-­‐mail	
  with	
  an	
  enAcing	
  
     header.	
  
	
  
•  The	
   Trojan	
   horse	
   is	
   typically	
   a	
   Windows	
   executable	
  
     program	
   file,	
   and	
   must	
   have	
   an	
   executable	
   file	
   extension	
  
     such	
   as	
   .exe,	
   .com,	
   .scr,	
   .bat,	
   or	
   .pif.	
   Since	
   Windows	
   is	
  
     configured	
   by	
   default	
   to	
   hide	
   extensions	
   from	
   a	
   user,	
   the	
  
     Trojan	
   horse's	
   extension	
   might	
   be	
   "masked"	
   by	
   giving	
   it	
   a	
  
     name	
   such	
   as	
   'Readme.txt.exe'.	
   With	
   file	
   extensions	
  
     hidden,	
   the	
   user	
   would	
   only	
   see	
   'Readme.txt'	
   and	
   could	
  
     mistake	
  it	
  for	
  a	
  harmless	
  text	
  file.	
  	
  



                                                                                                             40!
Where	
  They	
  Live	
  ?	
  (1)	
  
•  Autostart	
  Folder	
  
   The	
  Autostart	
  folder	
  is	
  located	
  in	
  C:WindowsStart	
  MenuPrograms
   startup	
  and	
  as	
  its	
  name	
  suggests,	
  automaAcally	
  starts	
  everything	
  placed	
  
   there.	
  	
  
•  Win.ini	
  
   Windows	
  system	
  file	
  using	
  load=Trojan.exe	
  and	
  run=Trojan.exe	
  to	
  execute	
  
   the	
  Trojan	
  	
  
•  System.ini	
  
   Using	
  Shell=Explorer.exe	
  trojan.exe	
  results	
  in	
  execuAon	
  of	
  every	
  file	
  aEer	
  
   Explorer.exe	
  	
  
•  Wininit.ini	
  
   Setup-­‐Programs	
  use	
  it	
  mostly;	
  once	
  run,	
  it's	
  being	
  auto-­‐deleted,	
  which	
  is	
  
   very	
  handy	
  for	
  Trojans	
  to	
  restart	
  	
  




                                                                                                                 41!
Where	
  They	
  Live	
  ?	
  (2)	
  
•  Winstart.bat	
  
   AcAng	
  as	
  a	
  normal	
  bat	
  file	
  trojan	
  is	
  added	
  as	
  @trojan.exe	
  to	
  hide	
  its	
  
   execuAon	
  from	
  the	
  user	
  	
  

•  Autoexec.bat	
  
   It's	
  a	
  DOS	
  auto-­‐starAng	
  file	
  and	
  it's	
  used	
  as	
  auto-­‐starAng	
  method	
  like	
  this	
  -­‐>	
  
   c:Trojan.exe	
  	
  

•  Config.sys	
  
   Could	
  also	
  be	
  used	
  as	
  an	
  auto-­‐starAng	
  method	
  for	
  Trojans	
  	
  

•  Explorer	
  Startup	
  
   Is	
  an	
  auto-­‐starAng	
  method	
  for	
  Windows95,	
  98,	
  ME,	
  XP	
  and	
  if	
  c:
   explorer.exe	
  exists,	
  it	
  will	
  be	
  started	
  instead	
  of	
  the	
  usual	
  c:Windows
   Explorer.exe,	
  which	
  is	
  the	
  common	
  path	
  to	
  the	
  file.	
  

                                                                                                                              42!
What	
  the	
  aNacker	
  wants?	
  
•  Credit	
  Card	
  InformaAon	
  (oEen	
  used	
  for	
  domain	
  	
  
   registraAon,	
  shopping	
  with	
  your	
  credit	
  card)	
  	
  

•  Any	
   accounAng	
   data	
   (E-­‐mail	
   passwords,	
   Login	
   passwords,	
  
   Web	
  Services	
  passwords,	
  etc.)	
  	
  

•  Email	
  Addresses	
  (Might	
  be	
  used	
  for	
  spamming,	
  as	
  explained	
  
   above)	
  	
  	
  

•  Work	
   Projects	
   (Steal	
   your	
   presentaAons	
   and	
   work	
   related	
  
   papers)	
  	
  	
  	
  

•  School	
  work	
  (steal	
  your	
  papers	
  and	
  publish	
  them	
  with	
  his/
   her	
  name	
  on	
  it)	
  
                                                                                             43!
Stopping	
  the	
  Trojan	
  …	
  
The	
  Horse	
  must	
  be	
  “invited	
  in”	
  ….	
  

 How	
  does	
  it	
  get	
  in?	
     By:	
  
                                                     Downloading	
  a	
  file	
  
                                       Installing	
  a	
  program	
  
                         Opening	
  an	
  aNachment	
  
              Opening	
  bogus	
  Web	
  pages	
  
    Copying	
  a	
  file	
  from	
  someone	
  else	
  

                                                                             44!
Zombie	
  
•  The	
   program	
   which	
   secretly	
   takes	
   over	
   another	
  
   networked	
   computer	
   	
   and	
   force	
   it	
   to	
   run	
   under	
   a	
  
   common	
  command	
  and	
  control	
  infrastructure.	
  
•  Uses	
  it	
  to	
  indirectly	
  launch	
  aNacks,	
  e.g.,	
  DDoS,	
  phishing,	
  
   spamming,	
  cracking	
  	
  
•  Difficult	
  to	
  trace	
  zombie’s	
  creator)	
  
•  Infected	
  computers	
  —	
  mostly	
  Windows	
  machines	
  —	
  are	
  
   now	
  the	
  major	
  delivery	
  method	
  of	
  spam.	
  

•  Zombies	
  have	
  been	
  used	
  extensively	
  to	
  send	
  e-­‐mail	
  
   spam;	
  between	
  50%	
  to	
  80%	
  of	
  all	
  spam	
  worldwide	
  is	
  now	
  
   sent	
  by	
  zombie	
  computers.	
  
	
                                                                                       45!
Adware	
  




             46!
Scareware	
  /	
  Rouge/	
  
   Fake	
  anAvirus	
  




                               47!
Where	
  malware	
  Lives:	
  Auto	
  start	
  
•  Folder	
  auto-­‐start	
  	
  

•  Win.ini	
  :	
  run=[backdoor]"	
  or	
  "load=[backdoor]".	
  

•  System.ini	
  :	
  shell=”myexplorer.exe”	
  

•  Autoexec.bat	
  

•  Config.sys	
  
•  Init.d	
  


                                                                     48!
Auto	
  start	
  
•  Assign	
  know	
  extension	
  (.doc)	
  to	
  the	
  malware	
  

•  Add	
  a	
  Registry	
  key	
  such	
  as	
  HKCUSOFTWAREMicroso=
   Windows	
  CurrentVersionRun	
  

•  Add	
  a	
  task	
  in	
  the	
  task	
  scheduler	
  

•  Run	
  as	
  service	
  




                                                                         49!
Web	
  
—    1.3%	
  of	
  the	
  incoming	
  search	
  queries	
  to	
  Google	
  returned	
  at	
  a	
  
      least	
  one	
  malware	
  site	
  


—    Visit	
  sites	
  with	
  an	
  army	
  of	
  browsers	
  in	
  VMs,	
  check	
  for	
  changes	
  
      to	
  local	
  system	
  


—    Indicate	
  potenAally	
  harmful	
  sites	
  in	
  search	
  results	
  
Web:	
  Fake	
  page	
  




                           51!
Shared	
  folder	
  




                       52!
Email	
  




            53!
Email	
  again	
  




                     54!
P2P	
  Files	
  




•  35.5%	
  malwares	
  
	
  

                           55!
Typical	
  Symptoms	
  
•    File	
  deleAon	
  
•    File	
  corrupAon	
  
•    Visual	
  effects	
  
•    Pop-­‐Ups	
  
•    Computer	
  crashes	
  
•    Slow	
  ConnecAon	
  
•    Spam	
  Relaying	
  




                                              56!
Distributed Denial of Service
•  A	
  denial-­‐of-­‐service	
  aKack	
  is	
  an	
  aNack	
  that	
  causes	
  a	
  loss	
  
   of	
   service	
   to	
   users,	
   typically	
   the	
   loss	
   of	
   network	
  
   connecAvity.	
  

•  CPU,	
   memory,	
   network	
   connecAvity,	
   network	
  
   bandwidth,	
  baNery	
  energy	
  

•  Hard	
  to	
  address,	
  especially	
  in	
  distributed	
  form	
  




                                                                                                 57!
DDoS	
  Mechanism	
  
•  Goal:	
  make	
  a	
  service	
  unusable.	
  

•  How:	
   overload	
   a	
   server,	
   router,	
   network	
   link,	
   by	
  
   flooding	
  with	
  useless	
  traffic	
  

•  Focus:	
   bandwidth	
   aNacks,	
   using	
   large	
   numbers	
   of	
  
   “zombies”	
  	
  
	
  



                                                                                 58!
How	
  it	
  works?	
  
•  The	
   flood	
   of	
   incoming	
   messages	
   to	
   the	
   target	
   system	
  
   essenAally	
   forces	
   it	
   to	
   shut	
   down,	
   thereby	
   denying	
  
   service	
  to	
  the	
  system	
  to	
  legiAmate	
  users.	
  	
  

•      VicAm's	
  IP	
  address.	
  	
  
•      VicAm's	
  port	
  number.	
  	
  
•      ANacking	
  packet	
  size.	
  	
  
•      ANacking	
  inter-­‐packet	
  delay.	
  	
  
•  DuraAon	
  of	
  aNack.	
  	
  
	
  

                                                                                            59!
Example	
  1	
  
•  Ping-­‐of-­‐death	
  
    –  IP	
  packet	
  with	
  a	
  size	
  larger	
  than	
  65,536	
  bytes	
  is	
  illegal	
  by	
  standard	
  

    –  Many	
  operaAng	
  system	
  did	
  not	
  know	
  what	
  to	
  do	
  when	
  they	
  received	
  
       an	
  oversized	
  packet,	
  so	
  they	
  froze,	
  crashed	
  or	
  rebooted.	
  

    –  Routers	
  forward	
  each	
  packet	
  independently.	
  

    –  Routers	
  don’t	
  know	
  about	
  connecAons.	
  


    –  Complexity	
  is	
  in	
  end	
  hosts;	
  routers	
  are	
  simple.	
  




                                                                                                                       60!
Example	
  1	
  
Example	
  2	
  
•    TCP	
  handshake	
  

•    SYN	
  Flood	
  
      –  A	
  stream	
  of	
  TCP	
  SYN	
  packets	
  directed	
  to	
  a	
  listening	
  TCP	
  port	
  at	
  the	
  
           vicAm	
  
      –  The	
  host	
  vicAm	
  must	
  allocate	
  new	
  data	
  structures	
  to	
  each	
  SYN	
  request	
  
      –  legiAmate	
  connecAons	
  are	
  denied	
  while	
  the	
  vicAm	
  machine	
  is	
  waiAng	
  	
  
           to	
  complete	
  bogus	
  "half-­‐open"	
  connecAons	
  
      –  Not	
  a	
  bandwidth	
  consumpAon	
  aNack	
  

•    IP	
  Spoofing	
  




                                                                                                                          62!
Example	
  2	
  




                   63!
From	
  DoS	
  to	
  DDoS	
  




                                64!
From	
  DoS	
  to	
  DDoS	
  




                                65!
Distributed	
  DoS	
  ANack	
  




                                  66!
DDoS	
  Countermeasures	
  
•    Three	
  broad	
  lines	
  of	
  defense:	
  

     1.  aNack	
  prevenAon	
  &	
  preempAon	
  (before)	
  

     2.  aNack	
  detecAon	
  &	
  filtering	
  (during)	
  

     3.  aNack	
  source	
  trace	
  back	
  &	
  idenAficaAon	
  (aEer)	
  




                                                                              67!

Contenu connexe

Tendances

Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systemsvampugani
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 

Tendances (20)

Web Security
Web SecurityWeb Security
Web Security
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Malicious
MaliciousMalicious
Malicious
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Virus
VirusVirus
Virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
User authentication
User authenticationUser authentication
User authentication
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Intruders
IntrudersIntruders
Intruders
 
Network Security
Network SecurityNetwork Security
Network Security
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 
Malicious software
Malicious softwareMalicious software
Malicious software
 

Similaire à Malicious software

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profitsr1nu
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 

Similaire à Malicious software (20)

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Cryptography presentation
Cryptography presentationCryptography presentation
Cryptography presentation
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Learning malware for fun and profit
Learning  malware for fun and profitLearning  malware for fun and profit
Learning malware for fun and profit
 
over view of viruses
over view of virusesover view of viruses
over view of viruses
 
computer viruses
computer virusescomputer viruses
computer viruses
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Isas
IsasIsas
Isas
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 

Plus de rajakhurram

Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication rajakhurram
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificatesrajakhurram
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryptionrajakhurram
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction rajakhurram
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail securityrajakhurram
 

Plus de rajakhurram (12)

Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
Lecture 7 certificates
Lecture 7 certificatesLecture 7 certificates
Lecture 7 certificates
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
Lecture 8 mail security
Lecture 8 mail securityLecture 8 mail security
Lecture 8 mail security
 

Dernier

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Dernier (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

Malicious software

  • 1. MALICIOUS  SOFTWARE   Raja  M.  Khurram  Shahzad   1!
  • 2. Overview   — IntroducAon   — Virus   — Worm   — Other  Malicious  SoEware   o     Backdoor/Trapdoor   o     Logic  Bomb   o     Trojan  Horse   — DDoS  ANack   o     DDos  DescripAon   o     ConstrucAon  of  ANack   2!
  • 3. Program DefiniAon   A  computer  program  tells  a  computer     what  to  do  and  how  to  do  it     •  Computer   viruses,   network   worms,     and   Trojan  Horse  are     computer  programs.       3!
  • 4. Malicious  soEware  ?   •  Malicious  SoEware  (Malware)  is  a  soEware  that  is  included  or   inserted  in  a  system  for  harmful  purposes.     OR       •  A   Malware   is   a   set   of   instrucAons   that   run   on   your   computer   and  make  your  system  do  something  that  an  aNacker  wants  it   to  do.     4!
  • 5. The  Malware  Zoo   •  Virus     •  Worms   •  Logic  Bomb   •  Trojan  horse   •  Zoombie   •  Scareware   •  Adware   •  Backdoor  /  Trapdoors   5!
  • 6. Taxonomy  of  Malicious  Programs   Malicious Programs Need Host Program Independent Trapdoors Logic Trojan Viruses Zombies Worms Bombs Horses Most current malicious code mixes all capabilities! 6!
  • 7. What  it  is  good  for  ?   •  Steal  personal  informaAon   •  Delete  files   •  Click  fraud     •  Steal  soEware  serial  numbers   7!
  • 8. What  to  Infect   •  Executable   •  Interpreted  file   •  Kernel   •  Service   •  Master  Boot  Record     8!
  • 9. Virus   •  Self-­‐replicaAng   code,   aNaches   itself   to   another   program   and  executes  secretly  when  the  host  program  is  executed.   •  No  Hidden  acAon   –  Generally  tries  to  remain  undetected,  but  what  about  acAviAes,   such  as  deleted  files  ?   9!
  • 10. Parts  of  a  Virus   •  Three  Parts   –  InfecAon   Mechanism:   The   means   by   which   a   virus   spreads,   enabling   it   to   replicate,   also   referred   as   InfecAon  Vector.     –  Trigger:  The  event  or  condiAon  that  determines  when   the  payload  is  acAvated  or  delivered.     –  Payload:   The   payload   may   involve   damage   or   may   involve  benign  but  NOTICEABLE  acAvity.    
  • 11. Phases  –  Life  Cycle   •  Dormant  phase  -­‐  the  virus  is  idle   •  Propaga1on  phase  -­‐  the  virus  places  an  idenAcal  copy  of   itself  into  other  programs   •  Triggering  phase  –  the  virus  is  acAvated  to  perform  the   funcAon  for  which  it  was  intended   •  Execu1on  phase  –     the  funcAon  is  performed   11!
  • 13. OperaAon  rouAne   •  Operates   when   infected   code   executed   (execuAon   sequence)   –  Jump  to  Main  Virus  program   –  If  spread  (infecAon)  condiAon  then   {    For  target  files  :  if  not  infected,  then  alter  file  to  include  virus   }   –  Perform  malicious  acAon   –  Transfer  control  back   –  Execute  normal  program   •  If   the   infecAon   phase   is   rapid,   user   will   not   noAce   any   difference  between  the  execuAon  of  infected  program  and   uninfected  program.    
  • 14. Types  of  Viruses   •  On  the  basis  of  target   •  Boot   Sector   Infector:   Infects   master   boot   record   /   boot   record   (boot   sector)  of  a  disk  and  spreads  when  a  system  is  booted  with  an  infected   disk  (original  DOS  viruses).  They  are  Memory-­‐resident  Virus.       •  File  Infector  :  Infects  executable  files,  they  are  also  called  Parasi1c  Virus   as  they  aNach  their  self  to  executable  files  as  part  of  their  code.    Runs   whenever  the  host  program  is  executed.     •  Macro   Virus   –Infects   files   with   macro   code   that   is   interpreted   by   the   relevant  applicaAon,  such  as  doc  or  excel  files.       14!
  • 15. Types  of  Viruses   •  On  the  basis  of  concealment  strategy   •  Encrypted  Virus  –  A  porAon  of  virus  creates  a  random  encrypAon  key  and   encrypts   the   remainder   of   the   virus.   The   key   is   stored   with   the   virus.   When  the  virus  replicates,  a  different  random  key  is  generated.     •  Stealth  Virus  -­‐  explicitly  designed  to  hide  from  Virus  Scanning  programs.   •  Polymorphic  Virus  -­‐  mutates  with  every  new  host  to  prevent  signature   detecAon,  signature  detecAon  is  useless.     •  Metamorphic  Virus  –  Rewrites  itself  completely  with  every  new  host,  may   change  their  behavior  and  appearance.         15!
  • 16. Recent  addiAon:    Email  Virus   •  Moves   around   in   e-­‐mail   messages,   triggered   when   user   opens  aNachment   •  Do  local  damages  on  the  user’s  system   •  Propagates  very  quickly   •  Replicates  itself  by  automaAcally  mailing  itself  to  dozens      of  people  in  the  vicAm’s     e-­‐mail  address  book     16!
  • 17. Examples  of  risky  file  types   •  The  following  file  types  should  never  be  opened  if…   –  .EXE   –  .PIF   –  .BAT   –  .VBS   –  .COM   17!
  • 18. Viruses  PropagaAon   •  Virus  wriNen  in  some  language  e.g.  C,  C++,  Assembly   etc.   •  Inserted  into  another  program   –  use  tool  called  a  “dropper”   •  Virus  dormant  unAl  program  executed   –  then  infects  other  programs   –  eventually  executes  its  “payload”   18!
  • 19. Viruses  PropagaAon   •  An  executable  program   •  With  a  virus  at  the  front  (File  size  is  increased)   •  With  the  virus  at  the  end  (File  size  is  increased)   •  With  a  virus  spread  over  free  space  within  program     19!
  • 20. Viruses  PropagaAon   (a)  A  program   (b)  Infected    program   (c)  Compressed  infected  program   (d)  Encrypted  virus   (e)  Compressed  virus  with  encrypted  compression  code   20!
  • 21. AnA-­‐virus   •  It   is   not   possible   to   build   a   perfect   virus/malware   detector.   •  Analyze  system  behavior   •  Analyze  binary  to  decide  if  it  a  virus   •  Type  :   –  Scanner   –  Real  Ame  monitor   21!
  • 22. AnA-­‐virus   •  Scanners   –  First  GeneraAon,  relied  on  signature.     –  Second   GeneraAon,   relied   on   heurisAc   rules   or   integrity   checking  (e.g.  checksum  appended  to  a  program).   •  Real  Ame  Monitors   •  Third   GeneraAon,   memory   resident   and   idenAfy   virus   by   its   acAons  (behaviour).   •  Fourth  GeneraAon,  combinaAon  of  different  capabiliAes.     22!
  • 23. Worm   A computer worm is a self-replicating computer virus. It uses a network to send copies of itself to other nodes and do so without any user intervention.! 23!
  • 24. Comparision  of  Worm  Features   1)    Computer  Virus:   • Needs  a  host  file   • Copies  itself   • Executable   2)    Network  Worm:   • No  host  (self-­‐contained)     • Copies  itself       • Executable   3)    Trojan  Horse:   •   No  host  (self-­‐contained)   • Does  not  copy  itself   • Imposter  Program   24!
  • 25. Worm:  History   •  Runs  independently     –  Does  not  require  a  host  program   •  Propagates  a  fully  working  version  of  itself  to  other  machines   —  History   ◦  Morris  worm  was  one  of  the  first  worms  distributed  over  Internet   —  Two  examples     ◦  Morris  –  1998,   ◦  Slammer  –  2003   25!
  • 26. Worm  OperaAon   •  Worm  has  similar  phases  like  a  virus:   •  Dormant  (inacAve;    rest)   •  PropagaAon   •  Search  for  other  systems  to  infect   •  Establish  connecAon  to  target  remote  system   •  Replicate  self  onto     remote  system   –  Triggering   –  ExecuAon   26!
  • 27. Morris  Worm   •  Best  known  classic  worm   •  Released  by  Robert  Morris  in  1988   •  Targeted  Unix  systems   •  Using  several  propagaAon  techniques   •  If  any  aNack  succeeds  then  replicated  self   27!
  • 28. Slammer  (Sapphire)  Worm   •  When   •  Jan  25  2003   •  How   •  Exploit  Buffer-­‐overflow  with  MS  SQL   •  Random  Scanning   •  Randomly  select  IP  addresses   •  Cost   •  Caused  ~  $2.6  Billion  in  damage     28!
  • 29. Slammer  Scale   The  diameter  of  each  circle  is  a  funcAon  of  the  number  of  infected  machines,  so   large   circles   visually   under   represent   the   number   of   infected   cases   in   order   to   minimize  overlap  with  adjacent  locaAons     29!
  • 30. The  worm  itself  …   —  System  load   ◦  InfecAon  generates  a  number  of  processes   ◦  Password  cracking  uses  lots  of  resources   ◦  Thousands  of  systems  were  shut  down   •  Tries  to  infect  as  many  other  hosts  as  possible   –  When  worm  successfully  connects,  leaves  a  child  to  conAnue  the  infecAon   while  the  parent  keeps  trying  new  hosts   –  find  targets  using  several  mechanisms:  'netstat  -­‐r  -­‐n‘,  /etc/hosts,     •  Worm  DO  NOT:   –  Delete   system's   files,   modify   exisAng   files,   install   Trojan   horses,   record   or   transmit  decrypted  passwords,  capture  super  user  privileges   30!
  • 31. Backdoor  or  Trapdoor   —  Secret  entry  point  into  a  program   —  Allows  those  who  know  access  by  passing  usual  security   procedures   —  Remains  hidden  to  casual  inspecAon   —  Can  be  a  new  program  to  be  installed   —  Can  modify  an  exisAng  program   —  Trap  doors  can  provide  access  to  a  system  for   unauthorized  procedures   —  Very  hard  to  block  in  O/S   31!
  • 32. Trap  Door  Example   (a)  Normal  code.     (b)  Code  with  a  trapdoor  inserted   32!
  • 33. Logic  Bomb   •  One  of  oldest  types  of  malicious  soEware   •  Piece  of  code  that  executes  itself  when  pre-­‐defined  condiAons  are   met   •  Logic  Bombs  that  execute  on  certain  days  are  known  as  Time   Bombs   •  AcAvated  when  specified  condiAons  met   –  E.g.,  presence/absence  of  some  file   –  parAcular  date/Ame   –  parAcular  user   •  When  triggered  typically  damage  system   –  modify/delete  files/disks,  halt  machine,  etc.   33!
  • 34. Tracing  Logic  Bombs   •  Searching - Even the most experienced programmers have trouble erasing all traces of their code •  Knowledge - Important to understand the underlying system functions, the hardware, the hardware/software/firmware/ operating system interface, and the communications functions inside and outside the computer •  Example of benign logical fun –  http://googletricks.com/top-25-fun-google-tricks/ –  Type zerg rush in google   34!
  • 36. Trojan  Horse   •  Trojan  horse  is  a  malicious  program    that  is  designed  as   authenAc,    real  and  genuine  soEware.       •  Like  the  giE  horse  leE  outside  the  gates  of  Troy  by  the   Greeks,   Trojan   Horses   appear   to   be   useful   or   interesAng   to   an   unsuspecAng   user,   but   are   actually   harmful.   36!
  • 38. What  Trojans  can  do  ?   •  Erase  or  overwrite  data  on  a  computer   •  Spread  other  viruses  or  install  a  backdoor.  In  this  case  the   Trojan  horse  is  called  a  'dropper'.   •  Sevng  up  networks  of  zombie  computers  in  order  to  launch   DDoS  aNacks  or  send  Spam.   •  Logging  keystrokes  to  steal  informaAon  such  as  passwords   and  credit  card  numbers  (known  as  a  key  logger)   •  Phish  for  bank  or  other  account  details,  which  can  be  used  for   criminal  acAviAes.   •  Or  simply  to  destroy  data   •  Mail  the  password  file.     38!
  • 39. How  can  you  be  infected  ?   •  Websites:  You  can  be  infected  by  visiAng  a  rogue  website.   Internet   Explorer   is   most   oEen   targeted   by   makers   of   Trojans  and  other  pests.  Even  using  a  secure  web  browser,   such  as  Mozilla's  Firefox,  if  Java  is  enabled,  your  computer   has  the  potenAal  of  receiving  a  Trojan  horse.   •  Instant   message:   Many   get   infected   through   files   sent   through  various  messengers.  This  is  due  to  an  extreme  lack   of   security   in   some   instant   messengers,   such   of   AOL's   instant  messenger.   •  E-­‐mail:   ANachments   on   e-­‐mail   messages   may   contain   Trojans.    Trojan  horses  via  SMTP.   39!
  • 40. Sample  Delivery   •  ANacker  will  aNach  the  Trojan  to  an  e-­‐mail  with  an  enAcing   header.     •  The   Trojan   horse   is   typically   a   Windows   executable   program   file,   and   must   have   an   executable   file   extension   such   as   .exe,   .com,   .scr,   .bat,   or   .pif.   Since   Windows   is   configured   by   default   to   hide   extensions   from   a   user,   the   Trojan   horse's   extension   might   be   "masked"   by   giving   it   a   name   such   as   'Readme.txt.exe'.   With   file   extensions   hidden,   the   user   would   only   see   'Readme.txt'   and   could   mistake  it  for  a  harmless  text  file.     40!
  • 41. Where  They  Live  ?  (1)   •  Autostart  Folder   The  Autostart  folder  is  located  in  C:WindowsStart  MenuPrograms startup  and  as  its  name  suggests,  automaAcally  starts  everything  placed   there.     •  Win.ini   Windows  system  file  using  load=Trojan.exe  and  run=Trojan.exe  to  execute   the  Trojan     •  System.ini   Using  Shell=Explorer.exe  trojan.exe  results  in  execuAon  of  every  file  aEer   Explorer.exe     •  Wininit.ini   Setup-­‐Programs  use  it  mostly;  once  run,  it's  being  auto-­‐deleted,  which  is   very  handy  for  Trojans  to  restart     41!
  • 42. Where  They  Live  ?  (2)   •  Winstart.bat   AcAng  as  a  normal  bat  file  trojan  is  added  as  @trojan.exe  to  hide  its   execuAon  from  the  user     •  Autoexec.bat   It's  a  DOS  auto-­‐starAng  file  and  it's  used  as  auto-­‐starAng  method  like  this  -­‐>   c:Trojan.exe     •  Config.sys   Could  also  be  used  as  an  auto-­‐starAng  method  for  Trojans     •  Explorer  Startup   Is  an  auto-­‐starAng  method  for  Windows95,  98,  ME,  XP  and  if  c: explorer.exe  exists,  it  will  be  started  instead  of  the  usual  c:Windows Explorer.exe,  which  is  the  common  path  to  the  file.   42!
  • 43. What  the  aNacker  wants?   •  Credit  Card  InformaAon  (oEen  used  for  domain     registraAon,  shopping  with  your  credit  card)     •  Any   accounAng   data   (E-­‐mail   passwords,   Login   passwords,   Web  Services  passwords,  etc.)     •  Email  Addresses  (Might  be  used  for  spamming,  as  explained   above)       •  Work   Projects   (Steal   your   presentaAons   and   work   related   papers)         •  School  work  (steal  your  papers  and  publish  them  with  his/ her  name  on  it)   43!
  • 44. Stopping  the  Trojan  …   The  Horse  must  be  “invited  in”  ….   How  does  it  get  in?   By:   Downloading  a  file   Installing  a  program   Opening  an  aNachment   Opening  bogus  Web  pages   Copying  a  file  from  someone  else   44!
  • 45. Zombie   •  The   program   which   secretly   takes   over   another   networked   computer     and   force   it   to   run   under   a   common  command  and  control  infrastructure.   •  Uses  it  to  indirectly  launch  aNacks,  e.g.,  DDoS,  phishing,   spamming,  cracking     •  Difficult  to  trace  zombie’s  creator)   •  Infected  computers  —  mostly  Windows  machines  —  are   now  the  major  delivery  method  of  spam.   •  Zombies  have  been  used  extensively  to  send  e-­‐mail   spam;  between  50%  to  80%  of  all  spam  worldwide  is  now   sent  by  zombie  computers.     45!
  • 46. Adware   46!
  • 47. Scareware  /  Rouge/   Fake  anAvirus   47!
  • 48. Where  malware  Lives:  Auto  start   •  Folder  auto-­‐start     •  Win.ini  :  run=[backdoor]"  or  "load=[backdoor]".   •  System.ini  :  shell=”myexplorer.exe”   •  Autoexec.bat   •  Config.sys   •  Init.d   48!
  • 49. Auto  start   •  Assign  know  extension  (.doc)  to  the  malware   •  Add  a  Registry  key  such  as  HKCUSOFTWAREMicroso= Windows  CurrentVersionRun   •  Add  a  task  in  the  task  scheduler   •  Run  as  service   49!
  • 50. Web   —  1.3%  of  the  incoming  search  queries  to  Google  returned  at  a   least  one  malware  site   —  Visit  sites  with  an  army  of  browsers  in  VMs,  check  for  changes   to  local  system   —  Indicate  potenAally  harmful  sites  in  search  results  
  • 53. Email   53!
  • 55. P2P  Files   •  35.5%  malwares     55!
  • 56. Typical  Symptoms   •  File  deleAon   •  File  corrupAon   •  Visual  effects   •  Pop-­‐Ups   •  Computer  crashes   •  Slow  ConnecAon   •  Spam  Relaying   56!
  • 57. Distributed Denial of Service •  A  denial-­‐of-­‐service  aKack  is  an  aNack  that  causes  a  loss   of   service   to   users,   typically   the   loss   of   network   connecAvity.   •  CPU,   memory,   network   connecAvity,   network   bandwidth,  baNery  energy   •  Hard  to  address,  especially  in  distributed  form   57!
  • 58. DDoS  Mechanism   •  Goal:  make  a  service  unusable.   •  How:   overload   a   server,   router,   network   link,   by   flooding  with  useless  traffic   •  Focus:   bandwidth   aNacks,   using   large   numbers   of   “zombies”       58!
  • 59. How  it  works?   •  The   flood   of   incoming   messages   to   the   target   system   essenAally   forces   it   to   shut   down,   thereby   denying   service  to  the  system  to  legiAmate  users.     •  VicAm's  IP  address.     •  VicAm's  port  number.     •  ANacking  packet  size.     •  ANacking  inter-­‐packet  delay.     •  DuraAon  of  aNack.       59!
  • 60. Example  1   •  Ping-­‐of-­‐death   –  IP  packet  with  a  size  larger  than  65,536  bytes  is  illegal  by  standard   –  Many  operaAng  system  did  not  know  what  to  do  when  they  received   an  oversized  packet,  so  they  froze,  crashed  or  rebooted.   –  Routers  forward  each  packet  independently.   –  Routers  don’t  know  about  connecAons.   –  Complexity  is  in  end  hosts;  routers  are  simple.   60!
  • 62. Example  2   •  TCP  handshake   •  SYN  Flood   –  A  stream  of  TCP  SYN  packets  directed  to  a  listening  TCP  port  at  the   vicAm   –  The  host  vicAm  must  allocate  new  data  structures  to  each  SYN  request   –  legiAmate  connecAons  are  denied  while  the  vicAm  machine  is  waiAng     to  complete  bogus  "half-­‐open"  connecAons   –  Not  a  bandwidth  consumpAon  aNack   •  IP  Spoofing   62!
  • 64. From  DoS  to  DDoS   64!
  • 65. From  DoS  to  DDoS   65!
  • 67. DDoS  Countermeasures   •  Three  broad  lines  of  defense:   1.  aNack  prevenAon  &  preempAon  (before)   2.  aNack  detecAon  &  filtering  (during)   3.  aNack  source  trace  back  &  idenAficaAon  (aEer)   67!