Presentation is loading. Please wait.

Presentation is loading. Please wait.

SpyWare! Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow.

Similar presentations


Presentation on theme: "SpyWare! Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow."— Presentation transcript:

1 SpyWare! Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow

2 Agenda Define SpyWare Define SpyWare Discuss methods used for spying Discuss methods used for spying Focus on passive tracking methods Focus on passive tracking methods Demonstrate one passive method Demonstrate one passive method Discuss prevention Discuss prevention Conclusions Conclusions

3 SpyWare Definition SpyWare is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. SpyWare is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. http://www.microsoft.com/athome/security/spyware/spywarewhat.m spx

4 SpyWare Categories Advertising (Passive) Advertising (Passive) –Capture browsing history –Capture buying habits Surveillance (Active) Surveillance (Active) –Key loggers –System Monitors

5 SpyWare Statistics 90% of all internet connected machines are infected 90% of all internet connected machines are infected ~28 SpyWare traces on each machine ~28 SpyWare traces on each machine 1/3 infected with surveillance SpyWare 1/3 infected with surveillance SpyWare 80% of infections were cookies 80% of infections were cookies

6 Passive Tracking Methods Web Beacons Web Beacons Cookies deposits Cookies deposits

7 Web Beacons Also know as Also know as –Web Bugs –Clear GIFs Allows destination to log page hits Allows destination to log page hits Can be used in conjunction with cookies Can be used in conjunction with cookies

8 Cookie Fields ParameterDescription Name The name of the cookie. Value The value of the cookie. Expire The time the cookie expires. This is a Unix timestamp so is in number of seconds since the epoch. In other words, you'll most likely set this with the time() function plus the number of seconds before you want it to expire. Path The path on the server in which the cookie will be available. Domain The domain in which the cookie is available Secure When set to TRUE, the cookie will only be set if a secure connection exists. The default is FALSE. httponly When TRUE the cookie will be made accessible only through the HTTP protocol. Not supported on all browsers

9 Web Beacon w/Cookie Example: spywareWebBeaconCookieDeposit.html <html><head> Web Beacon Cookie Deposit Example Web Beacon Cookie Deposit Example </head><body> Web Beacon Cookie Deposit Example: Web Beacon Cookie Deposit Example: </body></html>

10 Server Code serverWebBeacon.php <?php if (!(isset($_COOKIE["SpyCookie"]))){ setcookie("SpyCookie", "ISpyOnYou", time()+3600); setcookie("SpyCookie", "ISpyOnYou", time()+3600);}?><html> PHP Test PHP Test <?php $filename = 'cookieCapture.txt'; $today = date("D M j G:i:s T Y"); $Content = "SpyCookie". " : ". "$_COOKIE[SpyCookie]". " : ". "$today\r\n"; if($handle = fopen($filename, 'a')){ fwrite($handle, $Content); fwrite($handle, $Content); fclose($handle); fclose($handle);}?> </html>

11 Cookie Capture File [cdshort@windom public_html]$ cat cookieCapture.txt SpyCookie : ISpyOnYou : Fri Dec 1 18:30:17 MST 2006 SpyCookie : ISpyOnYou : Fri Dec 1 18:30:38 MST 2006 [cdshort@windom public_html]$

12

13 Packet Capture

14 Conclusions Browser settings can prevent cookie deposit Browser settings can prevent cookie deposit Be careful what you download Be careful what you download –Don’t open the door willingly The use of cookies is fundamental The use of cookies is fundamental –The information provided is minimal

15 Questions?

16 References http://www.php.net/manual/en/function.setcookie.php http://www.php.net/manual/en/function.setcookie.php http://cs.uccs.edu/~cs301/php/php.html http://cs.uccs.edu/~cs301/php/php.html Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu,Peng-Chu Wang and Wei-Zen Su. A Surveillance Spyware Detection System Based on Data Mining Methods. 2006 IEEE Congress on Evolutionary Computation. Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu,Peng-Chu Wang and Wei-Zen Su. A Surveillance Spyware Detection System Based on Data Mining Methods. 2006 IEEE Congress on Evolutionary Computation. http://www.allaboutcookies.org/web-beacons/ http://www.allaboutcookies.org/web-beacons/ Wes Ames, Understanding Spyware: Risk and Response, 2004 IEEE IT Pro Wes Ames, Understanding Spyware: Risk and Response, 2004 IEEE IT Pro http://www.microsoft.com/athome/security/spyware/spywarewhat.m spx http://www.microsoft.com/athome/security/spyware/spywarewhat.m spx http://www.earthlink.net/about/press/pr_spyAudit/ http://www.earthlink.net/about/press/pr_spyAudit/


Download ppt "SpyWare! Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow."

Similar presentations


Ads by Google