SlideShare uma empresa Scribd logo
1 de 111
Malware ,[object Object],[object Object]
Welcome to the zoo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a malware ? ,[object Object]
What it is good for ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
A recent illustration ,[object Object],[object Object],[object Object],[object Object]
The Malware Zoo ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a Virus ? ,[object Object],[object Object]
Some Virus Type ,[object Object],[object Object]
What is a trojan A trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer Wikipedia
What is rootkit  ,[object Object],[object Object]
What is a worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes  and do so without any user intervention.
Almost 30 years of Malware ,[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Melissa spread by email and share Knark rootkit made by creed demonstrate the first ideas love bug  vb script that abused a weakness in outlook Kernl intrusion by optyx gui and efficent hidding mechanims
Number of malware signatures Symantec report 2009
Malware Repartition Panda Q1 report  2009
Infection methods
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to Infect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overwriting malware Targeted Executable Malware Malware
prepending malware Targeted Executable Malware Infected host Executable Malware
appending malware Targeted Executable Malware Infected host Executable Malware
Cavity malware Targeted Executable Infected host Executable Malware Malware
Multi-Cavity malware Targeted Executable Malware Malware Malware Malware
Packers Malware Infected host Executable Packer Payload
Packer functionalities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auto start ,[object Object],[object Object],[object Object],[object Object],[object Object]
Auto start cont. ,[object Object],[object Object],[object Object],[object Object]
Unix autostart ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Macro virus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document based malware ,[object Object],[object Object],[object Object]
Userland root kit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subverting the Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kernel rootkit PS KERNEL Hardware :  HD, keyboard, mouse, NIC, GPU P1 P2 P3 P3 rootkit
Subverting techniques ,[object Object],[object Object],[object Object]
Windows Kernel P1 P2 Pn Csrss.exe Win32 subsystem DLLs User32.dll, Gdi32.dll and Kernel32.dll Other Subsytems (OS/2 Posix) Ntdll.dll ntoskrnl.exe Hardware Abstraction Layer (HAL.dll) Hardware Underlying kernel Executive
Kernel Device driver P2 Win32 subsystem DLLs Ntdll.dll ntoskrnl.exe Interrupt Hook System service dispatcher System service dispatch table Driver Overwriting functions Driver Replacing Functions New pointer A C B
MBR/Bootkit ,[object Object]
BIOS MBR VBS NT Boot Sector BOOTMGR.EXE WINLOAD.EXE Windows 7 kernel HAL.DLL
Vboot ,[object Object],[object Object],[object Object],[object Object]
Hypervisor rootkit Target OS  Hardware App App
Hypervisor rootkit Target OS  Hardware App App Virtual machine monitor  Host OS  Rogue app
Propagation Vector Vector
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shared folder
Email propagation ,[object Object]
Valentine day ... ,[object Object]
Email again Symantec 2009
Fake codec
Fake antivirus ,[object Object]
Hijack you browser ,[object Object]
Fake page ! ,[object Object]
P2P Files ,[object Object],[object Object]
Backdoor
Basic InfectedHost Attacker TCP
Reverse InfectedHost Attacker TCP
covert InfectedHost Attacker ICMP
Rendez vous backdoor InfectedHost Attacker RDV Point
Bestiary
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adware
BackOrifice ,[object Object],[object Object]
Netbus ,[object Object],[object Object]
Symantec pcAnywhere
Browser Toolbar ...
Toolbar again
Ransomware ,[object Object],[object Object],[object Object],To unlock you need to send an SMS with the text4121800286to the number3649Enter the resulting code:Any attempt to reinstall the system may lead to loss of important information and computer damage from pandalab blog
Detection
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-virus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Impossibility result ,[object Object]
Impossibility result ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus signature ,[object Object],[object Object]
Heuristics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Checksum ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sandbox analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with Packer  ,[object Object],[object Object],[object Object]
Worms
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost of worm attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Worm (First major attack) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some historical worms of note Kienzle and Elder Worm Date Distinction Morris 11/88 Used multiple vulnerabilities, propagate to “nearby” sys ADM 5/98 Random scanning of IP address space Ramen 1/01 Exploited three vulnerabilities Lion 3/01 Stealthy, rootkit worm Cheese 6/01 Vigilante worm that secured vulnerable systems Code Red 7/01 First sig Windows worm; Completely memory resident Walk 8/01 Recompiled source code locally Nimda 9/01 Windows worm: client-to-server, c-to-c, s-to-s, … Scalper 6/02 11 days after announcement of vulnerability; peer-to-peer network of compromised systems Slammer 1/03 Used a single UDP packet for explosive growth
Increasing propagation speed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Code Red ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Code Red of July 13 and July 19 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Infection rate
Measuring activity: network telescope ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spread of Code Red ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Slides: Vern Paxson
Code Red 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Striving for Greater Virulence: Nimda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slides: Vern Paxson
Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks Slides: Vern Paxson
How do worms propagate? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
slammer ,[object Object],[object Object],[object Object],[object Object]
Slammer propagation
Number of scan/sec
Packet loss
A server view
Consequences ,[object Object],[object Object],[object Object],[object Object]
Worm Detection and Defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for automation ,[object Object],[object Object],months days hrs mins secs Contagion Period Signature Response Period 1990 Time 2005  Slide: Carey Nachenberg, Symantec Program Viruses Macro Viruses E-mail Worms Network Worms Flash Worms Pre- automation Post- automation Contagion Period Signature Response Period
Signature inference ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signature inference ,[object Object],[object Object],Slide: S Savage
Content sifting ,[object Object],[object Object],[object Object],[object Object],[object Object],Slide: S Savage
Observation: High-prevalence strings are rare (Stefan Savage, UCSD *) Only 0.6%  of the 40 byte  substrings  repeat more than 3 times  in a minute
The basic algorithm (Stefan Savage, UCSD *) Address  Dispersion  Table   Sources  Destinations Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (B) 1 (A) Address  Dispersion  Table   Sources  Destinations 1 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 1 (B) 1 (A) Address  Dispersion  Table   Sources  Destinations 1 1 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 2 (B,D) 2 (A,B) Address  Dispersion  Table   Sources  Destinations 1 2 Prevalence  Table Detector in network A B cnn.com C D E
(Stefan Savage, UCSD *) 1 (A) 1 (C) 3 (B,D,E) 3 (A,B,D) Address  Dispersion  Table   Sources  Destinations 1 3 Prevalence  Table Detector in network A B cnn.com C D E
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(Stefan Savage, UCSD *)

Mais conteúdo relacionado

Mais procurados

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 

Mais procurados (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
MALWARE
MALWAREMALWARE
MALWARE
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Wannacry
WannacryWannacry
Wannacry
 

Destaque

Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 
NTT SIC marketplace slide deck at Tokyo Summit
NTT SIC marketplace slide deck at Tokyo SummitNTT SIC marketplace slide deck at Tokyo Summit
NTT SIC marketplace slide deck at Tokyo SummitToshikazu Ichikawa
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Cloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsCloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsAsaf Nakash
 
Oracle cloud, private, public and hybrid
Oracle cloud, private, public and hybridOracle cloud, private, public and hybrid
Oracle cloud, private, public and hybridJohan Louwers
 
Docker containerization cookbook
Docker containerization cookbookDocker containerization cookbook
Docker containerization cookbookPascal Louis
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical trainingAjit Yohannan
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data IJCERT JOURNAL
 
Sfeldman bbworld 07_going_enterprise (1)
Sfeldman bbworld 07_going_enterprise (1)Sfeldman bbworld 07_going_enterprise (1)
Sfeldman bbworld 07_going_enterprise (1)Steve Feldman
 

Destaque (20)

bulliying
bulliyingbulliying
bulliying
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Malware
MalwareMalware
Malware
 
Malware
Malware Malware
Malware
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
NTT SIC marketplace slide deck at Tokyo Summit
NTT SIC marketplace slide deck at Tokyo SummitNTT SIC marketplace slide deck at Tokyo Summit
NTT SIC marketplace slide deck at Tokyo Summit
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsCloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloads
 
Oracle cloud, private, public and hybrid
Oracle cloud, private, public and hybridOracle cloud, private, public and hybrid
Oracle cloud, private, public and hybrid
 
Docker containerization cookbook
Docker containerization cookbookDocker containerization cookbook
Docker containerization cookbook
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data
 
Bol.com
Bol.comBol.com
Bol.com
 
Sfeldman bbworld 07_going_enterprise (1)
Sfeldman bbworld 07_going_enterprise (1)Sfeldman bbworld 07_going_enterprise (1)
Sfeldman bbworld 07_going_enterprise (1)
 

Semelhante a Malware

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Computer virus
Computer virusComputer virus
Computer virusomroyal
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 

Semelhante a Malware (20)

virus.ppt
virus.pptvirus.ppt
virus.ppt
 
Virus
VirusVirus
Virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer virus
Computer virusComputer virus
Computer virus
 
Senior seminar virus
Senior seminar virusSenior seminar virus
Senior seminar virus
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Malwares
MalwaresMalwares
Malwares
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 

Mais de Tuhin_Das

Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop AssemblerTuhin_Das
 
Operating System
Operating SystemOperating System
Operating SystemTuhin_Das
 
Operating System
Operating SystemOperating System
Operating SystemTuhin_Das
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Presentation
PresentationPresentation
PresentationTuhin_Das
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends DevelopmentsTuhin_Das
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENTTuhin_Das
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On GpsTuhin_Das
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine InterfacenewTuhin_Das
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its ApplicationTuhin_Das
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 

Mais de Tuhin_Das (14)

Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop Assembler
 
Aop2007
Aop2007Aop2007
Aop2007
 
SQL
SQLSQL
SQL
 
Operating System
Operating SystemOperating System
Operating System
 
Operating System
Operating SystemOperating System
Operating System
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Presentation
PresentationPresentation
Presentation
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENT
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On Gps
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine Interfacenew
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its Application
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 

Malware

Notas do Editor

  1. more like autoexec.bat etc
  2. Crss.exe Client/server run time sub system -> used to run a keep state of process => can be query in userland Ntdll -> convert api call to kernel call NTll do call gate jumps Executive dispatch syscall to the underlying kernel SSDT system service dispatch table HAL.dll hardware abstraction Transition using the int0x2E interrupt
  3. A Overwrite B Redirect by patching the service dispatch table C Redirect the interrupt
  4. VBS : volume boot sector MBR: master boot record white unknown green - 16 bits red 32 bits blue 64 bits
  5. Blue pill (Joanna) SubVirt (Microsoft)
  6. Blue pill (Joanna) injection method using raw disk access from user mode patched need a signed driver
  7. Sir Dystic Cult of the dead cow demonstrate the vuln of 98
  8. used to plant child pornography on the work computer of Magnus Eriksson law scholar at Lund University. The 3,500 images n lost his research position Fled the country acquitted in 2004
  9. Speak of sending mail