Copyright John “Four” Flynn 2005. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,

Slides:



Advertisements
Similar presentations
CHECK 2012 Bridging the Gap for Mobile Devices: Eager Adoption v. Practical Support Emporia State University The Faculty & Staff Support Perspective Cory.
Advertisements

What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen Network Security Analyst,
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Maintaining Business Continuity After Internal and External Incidents Greg Schaffer, CISSP Director of Network Services Middle Tennessee State University.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Windows Security and Rootkits Mike Willard January 2007.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
JA-SIG CAS Enterprise Single Sign-On Scott Battaglia Application Developer Enterprise Systems & Services Rutgers, the State University of New Jersey Copyright.
 Copyright Curtis D. Edmonds,  This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Return On Security Investment Taz Daughtrey Becky Neary James Madison University EDUCAUSE Security Professionals Workshop May 18, 2004 Copyright Taz Daughtrey.
Jeff McKinney Exchange to Mirapoint Migration January 11, 2006 Securing Exchange to Mirapoint Jeff McKinney University of Maryland Dept of Electrical.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Multimedia Modules Teaching and Learning Multimedia Applications with Written Scripts John Bowers, Director of Computing Services Pam Gades, Instructional.
The 2007 Horizon Report: Six Technologies to Watch ELI 2007 Annual Meeting Atlanta, GA.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Considerations for Patch Management – an RFP Extensive RFP Extensive RFP Pain in the Butt Pain in the Butt 10 Minutes to tell you about it 10 Minutes to.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina.
Windows Memory Forensics and Direct Kernel Object Manipulation Jesse Kornblum.
VMM Based Rootkit Detection on Android Class Presentation Pete Bohman, Adam Kunk, Erik Shaw.
Middleware 101 Dave Tomcheck UC Irvine. Overview Drivers and Assumptions Objectives The Components of the Business Architecture Implications for Stakeholders.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Rootkits in Windows XP  What they are and how they work.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
Monnappa KA  Info Security Cisco  Member of SecurityXploded  Reverse Engineering, Malware Analysis, Memory Forensics 
Grids USC Case Study Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
CAP6135: Malware and Software Vulnerability Analysis Rootkits Cliff Zou Spring 2012.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Hidden Processes: The Implication for Intrusion Detection
Rootkits What are they? What do they do? Where do they come from?
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
1 Presenters: Lucretia Parham Sara Connor Armstrong Atlantic State University October 30, :45 – 12:35 Copyright Sara Connor and Lucretia Parham,
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Copyright Security-Assessment.com 2006 Rootkits – Advanced Malware Presented by Darren Bilby Brightstar, IT Security Summit, April 2006.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Lecture 8 Rootkits Hoglund/Butler (Chapter 7-8). Avoiding detection Two ways rootkits can avoid detection –Modify execution path of operating system to.
1 Carl Berger NlII Spring Focus: Survey results Copyright Carl Berger This work is the intellectual property of the author. Permission is granted.
Detecting Windows Server Compromises Joanna Rutkowska HIVERCON 2003, Dublin, Ireland, November 6 th, 2003.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Copyright Christine E. Haile & Justin D. Sipher This work is the intellectual property of the authors. Permission is granted for this material.
Julian Hooker Assistant Managing Director Educause Southwest
Hidden Processes: The Implication for Intrusion Detection
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Rootkits Jonathan Hobbs.
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

Copyright John “Four” Flynn This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Modern Incident Response Tools and Techniques John “Four” Flynn - GWU

Obligatory Overview Slide Rootkits What they are How they work Discovery techniques Detecting Rootkits FRISK/IR Best tool ever made No upwardly sloping charts

Rootkits Definition Post exploitation Hide actions on the host Why is this a threat? Difficult to detect Difficult to remove

A Little History Binary modification Tripwire Rootkit techniques

Rootkits Privilege Levels – Ring 0,3 Intel supports 4 levels, why not use them? Kernel Mode vs. User Mode Kernel mode means full write access to ALL of memory

User Mode Rootkits Win32 API vs. Native API PE file format Import Table Hooking

Obtaining Ring 0 Exploiting the Kernel Symantec FW DNS mishandling vuln Old and patched but illustrative Device Drivers Other Kernel Overflows/Exploits

Kernel Mode Techniques System Dispatch Table Hooking Process Unlinking Remove pointer to EPROCESS structure Process still gets CPU time! DKOM – (FU) Hoglund’s 2 bit patch Sky is truly the limit

Detecting Rootkits Execution Path Analysis See where the PE Import Pointers go Walk the dispatch table and follow pointers API Diff Compare Results from Win32 vs. Native API Kernel Data Structure Analysis Process Table Kernel Dispatcher Thread Table

I Lied: Upward Sloping Chart

A losing battle? Intrinsic Problem: Full Memory Write Access = Infinite possiblities Live response vs offline analysis Offline Analysis will catch all of these threats Offline analysis is expensive So is doing incident response worth it?

Incident Response in Higher-Ed Small number of security staff Relatively high number of incidents due to “open network” policies Distributed support network Massive number of endpoints Sound Familiar?

The Solution: FRISK/IR Flexible HTML template-driven output system Secure uploading of results to a central location Robust plugin architecture Forensically Sound and Automated Open Source, Perl Based, Clean Design Perform Response on Critical Systems Quickly

FRISK: Secure Uploads HARD problem Assume credentials can be stolen Authenticated SSL Upload communication with a CGI script View data with a different set of credentials

FRISK - Plugins Perl Based OS Aware Can call 3 rd party binary or perform operations directly in perl Hope to start a nessus-style update system

FRISK/IR Forensically Sound Never touches disk on local system Can be run from read-only media (CD-ROM) Plugin System Easy to write and add new plugins Full Perl! Automatic Update… (soon)

Rootkit detection VICE: Execution Path Analysis RootkitRevealer: Win32 API vs Raw Reads(reg/fs) Klister – Lists Threads used by Kernel Dispatcher Blacklight Rkdetector Strider Ghostbuster - offline vs. online diff FHS – Find Hidden Service Unhackme Others…

Conclusions While live response is imperfect, it is often our first and most important line of defense Thanks for your attention! Please help me make FRISK even better!

References/Links “Step into the Ring 0” Barnaby Jack – Eeye Greg Hoglund – Exploiting Software James Butler – Misc Papers Holy Father – Papers on hxdef etc