Presentation is loading. Please wait.

Presentation is loading. Please wait.

Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign.

Similar presentations


Presentation on theme: "Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign."— Presentation transcript:

1 Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign - CQURE: paula@idesign.net

2 Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary

3 The above means that every step leaves some trace! Windows 7 is designed to be used securely Achieved Evaluation Assurance Level (EAL) 4+ certification that meets Federal Information Processing Standard (FIPS) #140-2 Has C2 certification (Trusted Computer System Evaluation Criteria) Passed the Common Criteria Certification process

4 Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary

5 http://www.clearci.com Event Log Extendable Supported by API Plain text files (.log) Kernel traces Notifications SQL (ODBC) Application related

6 demo http://stderr.pl/cqure/tools.zip

7 demo Logs Less & More Advanced

8 http://www.batwinas.com Binaries are delivered With files from the Internet On the removable media Through LAN Through offline access By manipulating legitimate files Using vulnerabilities Buffer overflows

9 demo Replacing Files

10 demo "Vulnerabilities"

11 demo Services & ACLs

12 Cheating administrator Using automated ways Explorer Services Drivers DLLs Replacing files Path manipulation Injecting code Hooking calls

13 demo Services (In)Security

14 demo From A to Z - DLLs

15 demo Stuxnet Drivers

16 Problem: Too much information to control Solution: Select areas with high probability of infection DLLs Services Executables Drivers This attitude works as a first step

17 Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary

18

19 demo Protected Processes

20 Bypassing neighbored process objects Pointing the pointer nt!_eprocess ActiveProcessLinks manipulation Does not affect software operation Threads are still visible

21 demo Hidden Processes

22 http://www.lukechueh.com/

23 demo Hooking

24

25 demo Passwords In Operating System

26 Accountability IdeaHiding & Detecting 1234 Delivery & LaunchSummary

27 Learn how to detect malicious situations Know your system when it is safe – you need a baseline If you detect a successful attack – do not try to fight Report the issue Format your drive Estimate the range of the attack Know how to recover your data, when necessary

28 Breakout Sessions (SIA203, SIA311, SIA304, SIA307) Find Me Later At TLC

29 Connect. Share. Discuss. http://europe.msteched.com Learning Microsoft Certification & Training Resources www.microsoft.com/learning TechNet Resources for IT Professionals http://microsoft.com/technet Resources for Developers http://microsoft.com/msdn

30 Evaluations http://europe.msteched.com/sessions Submit your evals online

31


Download ppt "Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign."

Similar presentations


Ads by Google