Presentation is loading. Please wait.

Presentation is loading. Please wait.

Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.

Similar presentations


Presentation on theme: "Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits."— Presentation transcript:

1 Rootkits Jonathan Barella Chad Petersen

2 Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits

3 What is a Rootkit, and how does it work Jonathan Barella

4 What are rootkits? A rootkit is small sophisticated piece of support software that can enable malicious software to run on the compromised computer Commonly associated with spies because of the common goals they share Used in almost every modern piece of malware in the wild today

5 What are rootkits? Broadly defined by Symantec as “any software that acquires and maintains privileged access to the Operating System (OS) while hiding its presence by subverting normal OS behavior” Designed with three main objectives Run Hide Act

6 How do rootkits work? Subverting Normal OS Behavior Vulnerabilities Operating System Applications Exploits Java HTML/Scripting Social Engineering Spam Downloading Installation

7 How do rootkits work? Hooking Operating System APIs

8 How do rootkits work? Hiding in Unused Space on the Compromised System

9 How do rootkits work? Infect the Master Boot Record (MBR)

10 How do rootkits work?

11 This is the ultimate goal to be hidden from the systems view.

12 Finding And Removing Rootkits Chad Petersen

13 Detection Methods Behavioral Integrity Signature Difference

14 Behavioral Detection Pros Can detect unknown rootkits Cons Requires “normal” history Not easy to use False positives

15 Integrity Detection Pros Know what files change When files change What changes files Cons Requires many updates Rootkit can seed itself in update

16 Signature Based Detection Pros Reliably find known kits Easy to use Few false positives Cons large number of updates Does not detect new kits

17 Diff Based Detection Pros Good at finding anomalies in any system Cons does not work well if scan is ran on infected system Must have knowledge to decipher flagged programs.

18 Be Vigilant Lastly the user can sometimes tell when something is amis Network traffic spike Large decrease in performance Rootkits can infect; user files, kernel files, the boot loader, a hypervisor, and hardware firmware.

19 Steps Once Identified Quarantine Encryption Permissions Decide Repair or delete

20 Q&A


Download ppt "Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits."

Similar presentations


Ads by Google