Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen Network Security Analyst,
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Security for Seniors SeniorNet Help Desk
Botnets An Introduction Into the World of Botnets Tyler Hudak
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Three steps to prevent Malware infection
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
Information Security Session October 24, 2005
Computer Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software Inspector  2) Network Software Inspector

Basic Steps for an Infection  Save all important data  Best: Wipe the machine-do a fresh install  If this is not possible- then try to clean it  Change all passwords  Install latest anti-virus software  Apply all patches  Turn on the Firewall  Let the NSO know so we can search for other compromised machines

Advanced Steps for an Infection  SecCheck  Virus Total  Malware Analysis: 1. Norman Sandbox 2. Anubis 3. CWSandbox 4. Threat Expert

Different Types of Infections  Virus – Relies on users to spread: attachments, links in an  Worm – can spread on its own  Trojan – A malicious file that appears to be legitimate  Bot – A worm that phones home to a Command & Controller so the attacker can give it instructions

What Do Most Infections Do?  Send Spam  Scan the network  Attack other machines – called a DDOS (Distributed Denial of Service) attack  Run a distribution server for malicious files: web server or ftp server  Set up a Phishing site  Act as a proxy for other malicious traffic  Download spyware and adware to the machine  Run a keylogger

Guidelines for Attempting to Clean a Machine  Install an AV tool like Symantec Anti-Virus Corporate Edition with the latest signatures and run a full scan  Other techniques/tools:  Seccheck (Windows)  netstat –anb (Windows command line)  lsof (Linux)  Ultimate Boot CD for Windows (UBCD)  Sysinternals Suite (Windows GUI)

Spam Proxys and SecCheck  Lawrence Baldwin is the author of seccheck and owner of mynetwatchman.com  He was directly involved in taking down a spam botnet which was responsible for sending out 5-10% of the mail on the Internet =~ about 2-10 billion spam messages per day

SecCheck continued  Windows forensic tool  Aids in the detection and removal of malicious software  Passive  Runs in about three-six minutes  Send me the URL for the report and I can help analyze it

STC Josh Leibner after running SecCheck “I'm pretty baffled as to why AV, HijackThis, and AdAware didn't catch any of this. I'll set up another appointment with the student so that I can more thoroughly clean the computer.”

Actual Reports for WashU IPs  p?submissionID=190837b316eedbd6aab02db074f67a77 p?submissionID=190837b316eedbd6aab02db074f67a77  p?submissionID=76a554a590f845d26fc06274d5a847c8 p?submissionID=76a554a590f845d26fc06274d5a847c8  p?submissionID=4d7ab225b5f447f6346db1f4733bbac6 p?submissionID=4d7ab225b5f447f6346db1f4733bbac6  p?submissionID=70c2f42b966fe39baf d92403b p?submissionID=70c2f42b966fe39baf d92403b  p?submissionID=7bc71e08adf1cf344d1689ac7a0d08a9 p?submissionID=7bc71e08adf1cf344d1689ac7a0d08a9

Use A Tool to Check for Third Party Software Vulnerabilities Like Secunia’s PSI or NSI

Useful Links:       us/sysinternals/default.aspx us/sysinternals/default.aspx 

Contact Information And More Useful Links  – NSO website  If you have a computer security incident the NSO at or directly to me at  - WashU Computer Policy  - Seccheck  – Ultimate Boot CD for Windows  – Phishing Information  mozilla.com – Download Firefox mozilla.com  /default.mspx - Microsoft Defender /default.mspx

Watch Out For Malicious links and attachments  Links to phishing and hacking sites, as well as malicious files, can arrive by , instant message, web page, etc.  Know your source!  Verify before clicking.  Don’t open anything unexpected.  ~100 users were removed from the network for days because of a bot infection transmitted through an AIM link

Use it to identify: Phishing Malicious links And to protect personal information!