SlideShare a Scribd company logo
1 of 50
Download to read offline
Botnets Die Hard
Owned and Operated



          ,         ,      , Las Vegas , 2012
 Aditya K Sood | Richard J Enbody
SecNiche Security | Department of Computer Science and Engineering
                    Michigan State University
About Us
 Aditya K Sood
      ● PhD Candidate at Michigan State University
          –   Working with iSEC Partners
          –   Worked previously for Armorize, Coseinc and KPMG
          –   Active Speaker at Security conferences
          –   LinkedIn - http ://www.linkedin.com/in/adityaks
          –   Website: http://www.secniche.org | Blog: http://secniche.blogspot.com
          –   Twitter: @AdityaKSood

 Rohit Bansal
          – Security Researcher, SecNiche Security Labs

 Dr. Richard J Enbody
      ● Associate Professor, CSE, Michigan State University
          – Since 1987, teaching computer architecture/ computer security / mathematics
          – Co-Author CS1 Python book, The Practice of Computing using Python.
          – Patents Pending – Hardware Buffer Overflow Protection


                                                                                          2
Disclaimer
 This research relates to my own efforts and does not provide the
  view of any of my present and previous employers.




                                                                3
Agenda
 Bot Spreading Mechanisms
          –   Browser Exploit Packs
          –   Drive-by-Download frameworks
          –   Spreaders
          –   Demonstration

 POST Exploitation
          –   Understanding Ruskill
          –   DNS Changer in Action
          –   Other System Manipulation Tactics
          –   Demonstration

 Exploiting Browsers/HTTP – Data Ex-filtration
          –   Man in the Browser
          –   Formgrabbing
          –   Web Injects
          –   Demonstration

 Conclusion
                                                  4
Rise of Hybrid & Third Generation Botnets
                  (TGB)
Zeus | SpyEye | Andromeda | Smoke | NGR | Upas | … . .. .. . . ..




                                                              5
TGB Infections started with Zeus !




                                     6
The Artifact


The devil is present in the details.




                                       7
Bot Spreading Mechanisms
     Widely Deployed




                           8
Browser Exploit Packs
 Browser Exploit Packs (BEPs)
   ─ Overview
       ●   Automated frameworks containing browser exploits
       ●   Implements the concept of Drive-by-Download attacks
       ●    Exploits are bundled as unique modules
       ●   Mostly written in PHP + MySQL
             – PHP code is obfuscated with Ion Cube encoder
       ● Successfully captures the statistics of infected machine
       ● Widely used BEPs are – BlackHole / Nuclear / Phoenix etc.


   ─ How exploit is served?
       ● Fingerprinting browser’s environment
             – User-Agent string parameters
             – Plugin detection module – Java / PDF / Flash
             – Custom JavaScripts for extracting information from the infected machine


                                                                                         9
Browser Exploit Packs
 Obfuscated JavaScripts used in BlackHole Infections
       ● Hiding the infected domain



                                                 Obfuscated Script




Deobfuscated Script




                                                                10
Browser Exploit Packs
 Plugin Detection Code
   ─ Scripts code taken from real world case studies


                                                       PDF ActiveX Detection




                                          PDF Plugin Detection


                                                                         11
Demonstration




                12
Drive-by-Download Attacks
 Drive-by-Download
      ●   Victim browser is forced to visit infected website
      ●   Iframe redirects browser to the BEP
      ●   Exploit is served by fingerprinting the browser environment
      ●   Browser is exploited successfully using JavaScript Heap Spraying
      ●   BEP silently downloads the malware onto the victim machine




                                                                             13
Drive-by-Download Frameworks
 Drive-by-Download Frameworks
   ─ Java Drive-by Generator




                                    14
Demonstration




                15
Spreaders
 USB Spreading (Upas Bot - Case Study)
   ─ Inside USB Spreader
          – Widely used technique in bot design for infecting USB devices
   ─ Win 32 Implementation
      ● Bot calls RegisterDeviceNotificationW function
               » It can also be implemented as a windows service




                                                               GUID for Raw USB Device




                                                                                    16
Spreaders
 USB Spreading (Upas Bot - Case Study)
   ─ Plug and Play (PnP) Devices have unique set of different GUIDs
           – Device interface GUID
                » Required for dbcc_classguid  DEV_BROADCAST_DEVICEINTERFACE
           – Device class GUID
                » Defines wide range of devices


       ● Defines WindowProc as follows
                » WM_DEVICECHANGE notification message in DEV_BROADCAST_HDR
                » dbch_devicetype  DBT_DEVTYP_DEVICEINTERFACE


       ● Wait for the USB device and triggers device-change event as follows:
           – wParam in WindowProc
                » DBT_DEVICEARRIVAL | DBT_DEVICEREMOVALCOMPLETE
           – Fetches drive letter of the USB devices as follows
                » dbcv_unitmask in _DEV_BROADCAST_VOLUME | Logical drive information


       ● Continued …….
                                                                                       17
Spreaders
 USB Spreading (Upas Bot - Case Study)
   ─ On successful detecting the USB, bot execute function as follows;
            – CopyFileW to copy malicious executable in the USB drive
            – CreateFileW to create autorun.inf file in the USB root directory
            – SetFileAttributesW to apply required files attribute




    Autorun.inf infection

                                                                                 18
Spreaders
 USB Spreading (Upas Bot - Case Study)
   ─ Infecting USB devices using Malicious .LNK file infection

    .LNK infection




                                                                 19
Spreaders
 USB Spreading (Upas Bot - Case Study)
   ─ Upas bot in action




                                          20
Spreaders
 Upas Bot Network Behavior Detection
   ─ Writing signature specific to USB infection




                                                   21
Social Networks Exploitation
 Social Networks
   ─ Provide launchpads for spreading malware
   ─ Easy to trick users and force them to download malware.
   ─ Attackers exploit inherent design of social networks
       ● Example:- Likejacking in collaboration with Clickjacking




                                                                    22
Demonstration




                23
POST Exploitation
Subverting System Integrity




                              24
Understanding Ruskill
 What is Ruskill ?
   ─ A termed coined in Russia
       ● It refers to the group of warriors who demonstrate their skill in the battle
       ● Typically used by Diablo game players to demonstrate the strength and power


   ─ How does Ruskill is related to bots?
       ● Ruskill module is used to demonstrate the capability of bots
       ● Removing traces of malware in the system after successful reboot
           – Ruskill is also used with PDEF+ (Proactive Defense)




                                                                                  25
Understanding Ruskill
 Inside Ruskill Module
   ─ Detected in the NGR (Dorkbot)
   ─ Remote file downloading and execution
       ● Ruskill allows the bot to fetch any executable from third-party resource and
         execute it in the compromised system
   ─ Restoring System
       ● Ruskill monitors all the changes performed by the malicious executable in the
         system
       ● Ruskill restores the registry, files ad network settings to the same state ( before
         the execution of malicious binary) after reboot
       ● Deletes the malicious executable after successful execution in the system




                                                                                       26
Understanding Ruskill
 Inside Ruskill Module




 Ruskill Detecting File, DNS
 and Registry modifications




                                          27
Demonstration




                28
Critical Problem - DNS Changer




                                 29
DNS Changer in Action
 DNS Changer
  ─ Exploiting the DNS resolution functionality of the infected machine
  ─ What it works for ?
      ● Blocking security providers websites (Implementing blacklists)
          – For example:
               » Blocking microsoft.com updates website to restrict the downloading of updates
               » Restricting the opening of anti-virus vendors websites
      ● Redirecting the browser to the malicious domain
          – For example:
               » Forcing the infected machine to download updates from the malicious domain
               » Triggering chain infection for downloading another set of malware onto the infected
                 system




                                                                                                   30
DNS Changer in Action
 DNS Changer
  ─ How this works?
     ● Replacing the DNS server entries in the infected machine with IP addresses of
       the malicious DNS server
     ● Adding rogue entries in the hosts configuration file
     ● Executing DNS amplification attack by subverting the integrity of LAN
       devices such as routers and gateways
         – It results in DNS hijacking at a large scale in the network
     ● Hooking DNS libraries
         – The preferred method is Inline hooking in which detour and trampoline functions
           are created to play with DNS specific DLLs.




                                                                                       31
DNS Changer in Action
 DNS Changer
  ─ Inside DNS hooking
     ● Hooking DNS API
         – Hooking DNSQuery (*) function calls in dnsapi.lib/dnsapi.dll
         – Implemented by creating a blacklist
         – Bot hijacks the DNS resolution flow by filtering all the incoming DNS requests
     ● Hooking DNS Cache Resolver Service
         – Cache resolver service is used for DNS caching
         – Bot hooks sendto function in ws2_32.dll to verify the origin of DNS query to
           validate if sendto function is called by dnsrsslvr.dll




                                                                                          32
DNS Changer in Action
 DNS Changer
  ─ Implementation in NGR bot




                                        DNS Blocking




                      DNS Redirection

                                                       33
Demonstration




                34
Exploiting Browsers
Data Ex-filtration Over HTTP




                               35
Downgrading Browser Security
 Removing Protections
   ─ Nullifying browser client side security to perform stealthy operations
   ─ Internet Explorer
       ● Tampering zone values in the registry
            – SoftwareMicrosoftWindowsCurrentVersionInternet SettingsZones
   ─ Firefox
       ● Manipulating entries in user.js file
            – user_pref("security.warn_submit_insecure",false);
                 » Browser does not raise an alert box when information in sent over HTTP while
                   submitting forms.
            – user_pref("security.warn_viewing_mixed",false);
                 » Remove the warning of supporting mixed content over SSL.



       OLD School trick but works very effectively. Several other techniques
                 of subverting the browser security also exists



                                                                                              36
Man-in-the-Browser (MitB)
 Inside MitB
   ─ MitB typically refers to a userland rootkit that exploits the browser
     integrity




                                                                             37
What Lies Beneath?




               Note: The Pop up is triggered in user’s
               active session. So what it is actually?
               No doubt it is a Popup, but the
               technique is termed as Web Injects not
               phishing or something like that.




                                               38
Web Injects
 Web Injects
   ─ Based on the concept of hooking specific functions in the browser DLLs
   ─ On the fly infection tactic
   ─ Execution flow
       ●   Bot injects malicious content in the incoming HTTP responses
       ●   Injections are based on the entries in the static file named as webinjects.txt
       ●   Rules are statically defined by the botmaster
       ●   Bot fetches rules from the webinjects.txt file and injects in the live webpages
   ─ Information stealing in a forceful manner
       ● Exploits user ignorance




                                                                                       39
Web Injects



 What is meant by GPH flags?
   ─ Exploitation and infection metrics
       ● G - injection will be made only for the resources that are requested by the GET
       ● P - injection will be made only for the resources that are requested by the
         POST
       ● L - is a flag for grabbing content between the tags data_before and data_after
         inclusive
       ● H – similar as L except the ripped content is not included and the contents of
         tags data_before and data_after



                                                                                   40
Web Injects – Real Time Cases (1)




                      Forceful Cookie Injection in
                      Citibank’s website to
                      manipulate the user’s session




                                                 41
Web Injects – Real Time Cases (2)


                             Injecting HTML content in Bank of
                             America’s webpages to steal the
                             ATM number and the Pass code.




                Injecting HTML content in Wells
                Fargo bank to steal user’s ATM
                code.

                                                          42
Form Grabbing
 Form Grabbing
   ─ It is an advanced technique of capturing information present in forms




                                                                             43
Form Grabbing
 Why Form Grabbing ?
   ─   Keylogging produces plethora of data
   ─   Form grabbing – extracting data from the GET/POST requests
   ─   Based on the concept of hooking and DLL injection
   ─   No real protection against malware




                                                                    44
Form Grabbing
 Harvested Data




                            Harvested data from POST
                            requests. Kaspersky’s anti virus
                            license key entered by the user




                                                               45
Demonstration




                46
This Data is Not Yours !




            All Browsers !



                             47
Conclusion
   Botnets have become more robust and sophisticated
   Significant increase in exploitation of browsers
   HTTP has been used for data exfiltration
   Botnets die hard




                                                        48
Questions




            49
Thanks

 DEF Con crew
   ─ http://www.defcon.org


 SecNiche Security Labs
   ─ http://www.secniche.org
   ─ http://secniche.blogspot.com




                                       50

More Related Content

What's hot

Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel ExploitationScio Security
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & futureAlex Matrosov
 
Smartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareSmartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareAlex Matrosov
 
Embedded linux build systems
Embedded linux build systems  Embedded linux build systems
Embedded linux build systems Mender.io
 
Android On Development Boards at AnDevCon3
Android On Development Boards at AnDevCon3Android On Development Boards at AnDevCon3
Android On Development Boards at AnDevCon3Opersys inc.
 
Configuring wifi in open embedded builds
Configuring wifi in open embedded buildsConfiguring wifi in open embedded builds
Configuring wifi in open embedded buildsMender.io
 
Android Internals at Linaro Connect Asia 2013
Android Internals at Linaro Connect Asia 2013Android Internals at Linaro Connect Asia 2013
Android Internals at Linaro Connect Asia 2013Opersys inc.
 
Easy backup & restore with Clonezilla - Tips form Basic to Advanced
Easy backup & restore with Clonezilla - Tips form Basic to AdvancedEasy backup & restore with Clonezilla - Tips form Basic to Advanced
Easy backup & restore with Clonezilla - Tips form Basic to AdvancedChenkai Sun
 
Why kernelspace sucks?
Why kernelspace sucks?Why kernelspace sucks?
Why kernelspace sucks?OpenFest team
 
Android Hacks, Variants, Tricks and Resources ESC SV 2012
Android Hacks, Variants, Tricks and Resources ESC SV 2012Android Hacks, Variants, Tricks and Resources ESC SV 2012
Android Hacks, Variants, Tricks and Resources ESC SV 2012Opersys inc.
 
Android is NOT just 'Java on Linux'
Android is NOT just 'Java on Linux'Android is NOT just 'Java on Linux'
Android is NOT just 'Java on Linux'Tetsuyuki Kobayashi
 
Android Variants, Hacks, Tricks and Resources presented at AnDevConII
Android Variants, Hacks, Tricks and Resources presented at AnDevConIIAndroid Variants, Hacks, Tricks and Resources presented at AnDevConII
Android Variants, Hacks, Tricks and Resources presented at AnDevConIIOpersys inc.
 
Android Booting Sequence
Android Booting SequenceAndroid Booting Sequence
Android Booting SequenceJayanta Ghoshal
 
VM Forking and Hypervisor-based fuzzing
VM Forking and Hypervisor-based fuzzingVM Forking and Hypervisor-based fuzzing
VM Forking and Hypervisor-based fuzzingTamas K Lengyel
 
Learning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessLearning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessNanik Tolaram
 
Understanding the Android System Server
Understanding the Android System ServerUnderstanding the Android System Server
Understanding the Android System ServerOpersys inc.
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfeGol D Roger
 

What's hot (20)

Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel Exploitation
 
Bootkits: past, present & future
Bootkits: past, present & futureBootkits: past, present & future
Bootkits: past, present & future
 
Smartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malwareSmartcard vulnerabilities in modern banking malware
Smartcard vulnerabilities in modern banking malware
 
Embedded linux build systems
Embedded linux build systems  Embedded linux build systems
Embedded linux build systems
 
Android On Development Boards at AnDevCon3
Android On Development Boards at AnDevCon3Android On Development Boards at AnDevCon3
Android On Development Boards at AnDevCon3
 
Porting Android
Porting AndroidPorting Android
Porting Android
 
Configuring wifi in open embedded builds
Configuring wifi in open embedded buildsConfiguring wifi in open embedded builds
Configuring wifi in open embedded builds
 
Android Internals at Linaro Connect Asia 2013
Android Internals at Linaro Connect Asia 2013Android Internals at Linaro Connect Asia 2013
Android Internals at Linaro Connect Asia 2013
 
Easy backup & restore with Clonezilla - Tips form Basic to Advanced
Easy backup & restore with Clonezilla - Tips form Basic to AdvancedEasy backup & restore with Clonezilla - Tips form Basic to Advanced
Easy backup & restore with Clonezilla - Tips form Basic to Advanced
 
Why kernelspace sucks?
Why kernelspace sucks?Why kernelspace sucks?
Why kernelspace sucks?
 
Android Hacks, Variants, Tricks and Resources ESC SV 2012
Android Hacks, Variants, Tricks and Resources ESC SV 2012Android Hacks, Variants, Tricks and Resources ESC SV 2012
Android Hacks, Variants, Tricks and Resources ESC SV 2012
 
Android is NOT just 'Java on Linux'
Android is NOT just 'Java on Linux'Android is NOT just 'Java on Linux'
Android is NOT just 'Java on Linux'
 
Porting Android
Porting AndroidPorting Android
Porting Android
 
Android Variants, Hacks, Tricks and Resources presented at AnDevConII
Android Variants, Hacks, Tricks and Resources presented at AnDevConIIAndroid Variants, Hacks, Tricks and Resources presented at AnDevConII
Android Variants, Hacks, Tricks and Resources presented at AnDevConII
 
Android Booting Sequence
Android Booting SequenceAndroid Booting Sequence
Android Booting Sequence
 
VM Forking and Hypervisor-based fuzzing
VM Forking and Hypervisor-based fuzzingVM Forking and Hypervisor-based fuzzing
VM Forking and Hypervisor-based fuzzing
 
Learning AOSP - Android Booting Process
Learning AOSP - Android Booting ProcessLearning AOSP - Android Booting Process
Learning AOSP - Android Booting Process
 
Understanding the Android System Server
Understanding the Android System ServerUnderstanding the Android System Server
Understanding the Android System Server
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfe
 
olibc: Another C Library optimized for Embedded Linux
olibc: Another C Library optimized for Embedded Linuxolibc: Another C Library optimized for Embedded Linux
olibc: Another C Library optimized for Embedded Linux
 

Viewers also liked

Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Marco Balduzzi
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Carlos Laorden
 
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
Situational Awareness, Botnet and Malware Detection in the Modern Era  - Davi...Situational Awareness, Botnet and Malware Detection in the Modern Era  - Davi...
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...Codemotion
 
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber UndergroundAutomated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber UndergroundImperva
 

Viewers also liked (7)

Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011Collective classification for unknown malware detection - SECRYPT 2011
Collective classification for unknown malware detection - SECRYPT 2011
 
Advanced Malware Analysis
Advanced Malware AnalysisAdvanced Malware Analysis
Advanced Malware Analysis
 
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
Situational Awareness, Botnet and Malware Detection in the Modern Era  - Davi...Situational Awareness, Botnet and Malware Detection in the Modern Era  - Davi...
Situational Awareness, Botnet and Malware Detection in the Modern Era - Davi...
 
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber UndergroundAutomated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
Automated Hacking Tools - Meet the New Rock Stars in the Cyber Underground
 

Similar to DEF CON 20 - Botnets Die Hard - Owned and Operated

Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Aditya K Sood
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksAditya K Sood
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Aditya K Sood
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...Aditya K Sood
 
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?Aditya K Sood
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...SegInfo
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisTamas K Lengyel
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionWayne Huang
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat Security Conference
 
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...Gonéri Le Bouder
 
Machine learning in cybersecutiry
Machine learning in cybersecutiryMachine learning in cybersecutiry
Machine learning in cybersecutiryVishwas N
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Maksim Shudrak
 
The Ultimate Deobfuscator - ToorCON San Diego 2008
The Ultimate Deobfuscator - ToorCON San Diego 2008The Ultimate Deobfuscator - ToorCON San Diego 2008
The Ultimate Deobfuscator - ToorCON San Diego 2008Stephan Chenette
 
Android village @nullcon 2012
Android village @nullcon 2012 Android village @nullcon 2012
Android village @nullcon 2012 hakersinfo
 
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
Functional and Behavioral Analysis of Different Type of Ransomware.pptxFunctional and Behavioral Analysis of Different Type of Ransomware.pptx
Functional and Behavioral Analysis of Different Type of Ransomware.pptxtarkovtarkovski
 

Similar to DEF CON 20 - Botnets Die Hard - Owned and Operated (20)

Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 
Fireshark - Brucon 2010
Fireshark - Brucon 2010Fireshark - Brucon 2010
Fireshark - Brucon 2010
 
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?HackInTheBox -  AMS 2011 , Spying on SpyEye - What Lies Beneath ?
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysis
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download DetectionDrivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...High Performance Computing and Open Source & Linux Technical Excellence Sympo...
High Performance Computing and Open Source & Linux Technical Excellence Sympo...
 
Machine learning in cybersecutiry
Machine learning in cybersecutiryMachine learning in cybersecutiry
Machine learning in cybersecutiry
 
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bu...
 
Headless Android
Headless AndroidHeadless Android
Headless Android
 
The Ultimate Deobfuscator - ToorCON San Diego 2008
The Ultimate Deobfuscator - ToorCON San Diego 2008The Ultimate Deobfuscator - ToorCON San Diego 2008
The Ultimate Deobfuscator - ToorCON San Diego 2008
 
Android village @nullcon 2012
Android village @nullcon 2012 Android village @nullcon 2012
Android village @nullcon 2012
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
Functional and Behavioral Analysis of Different Type of Ransomware.pptxFunctional and Behavioral Analysis of Different Type of Ransomware.pptx
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
 
Android Internals
Android InternalsAndroid Internals
Android Internals
 

More from Aditya K Sood

Emerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareEmerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareAditya K Sood
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesEnfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesAditya K Sood
 
Detecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchDetecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchAditya K Sood
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...Aditya K Sood
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...Aditya K Sood
 
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodNetwork Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodAditya K Sood
 
Abusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAbusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAditya K Sood
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineNIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineAditya K Sood
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...Aditya K Sood
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...Aditya K Sood
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsAditya K Sood
 
NGR Bot Analysis Paper
NGR Bot Analysis PaperNGR Bot Analysis Paper
NGR Bot Analysis PaperAditya K Sood
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Aditya K Sood
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareAditya K Sood
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareAditya K Sood
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware TaxonomyAditya K Sood
 
PenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile HackingPenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile HackingAditya K Sood
 
Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing Aditya K Sood
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)Aditya K Sood
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Aditya K Sood
 

More from Aditya K Sood (20)

Emerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareEmerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks Malware
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesEnfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB Instances
 
Detecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchDetecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in Elasticsearch
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
 
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodNetwork Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
 
Abusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAbusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and Defences
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineNIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
NGR Bot Analysis Paper
NGR Bot Analysis PaperNGR Bot Analysis Paper
NGR Bot Analysis Paper
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web Malware
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware Taxonomy
 
PenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile HackingPenTest Magazine Teaser - Mobile Hacking
PenTest Magazine Teaser - Mobile Hacking
 
Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing Dissecting Java Server Faces for Penetration Testing
Dissecting Java Server Faces for Penetration Testing
 
VxWorks - Holistic Security (Art of Testing)
VxWorks - Holistic Security (Art of  Testing)VxWorks - Holistic Security (Art of  Testing)
VxWorks - Holistic Security (Art of Testing)
 
Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011Art of InfoJacking, Source Conference Seattle, 2011
Art of InfoJacking, Source Conference Seattle, 2011
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

DEF CON 20 - Botnets Die Hard - Owned and Operated

  • 1. Botnets Die Hard Owned and Operated , , , Las Vegas , 2012 Aditya K Sood | Richard J Enbody SecNiche Security | Department of Computer Science and Engineering Michigan State University
  • 2. About Us  Aditya K Sood ● PhD Candidate at Michigan State University – Working with iSEC Partners – Worked previously for Armorize, Coseinc and KPMG – Active Speaker at Security conferences – LinkedIn - http ://www.linkedin.com/in/adityaks – Website: http://www.secniche.org | Blog: http://secniche.blogspot.com – Twitter: @AdityaKSood  Rohit Bansal – Security Researcher, SecNiche Security Labs  Dr. Richard J Enbody ● Associate Professor, CSE, Michigan State University – Since 1987, teaching computer architecture/ computer security / mathematics – Co-Author CS1 Python book, The Practice of Computing using Python. – Patents Pending – Hardware Buffer Overflow Protection 2
  • 3. Disclaimer  This research relates to my own efforts and does not provide the view of any of my present and previous employers. 3
  • 4. Agenda  Bot Spreading Mechanisms – Browser Exploit Packs – Drive-by-Download frameworks – Spreaders – Demonstration  POST Exploitation – Understanding Ruskill – DNS Changer in Action – Other System Manipulation Tactics – Demonstration  Exploiting Browsers/HTTP – Data Ex-filtration – Man in the Browser – Formgrabbing – Web Injects – Demonstration  Conclusion 4
  • 5. Rise of Hybrid & Third Generation Botnets (TGB) Zeus | SpyEye | Andromeda | Smoke | NGR | Upas | … . .. .. . . .. 5
  • 6. TGB Infections started with Zeus ! 6
  • 7. The Artifact The devil is present in the details. 7
  • 8. Bot Spreading Mechanisms Widely Deployed 8
  • 9. Browser Exploit Packs  Browser Exploit Packs (BEPs) ─ Overview ● Automated frameworks containing browser exploits ● Implements the concept of Drive-by-Download attacks ● Exploits are bundled as unique modules ● Mostly written in PHP + MySQL – PHP code is obfuscated with Ion Cube encoder ● Successfully captures the statistics of infected machine ● Widely used BEPs are – BlackHole / Nuclear / Phoenix etc. ─ How exploit is served? ● Fingerprinting browser’s environment – User-Agent string parameters – Plugin detection module – Java / PDF / Flash – Custom JavaScripts for extracting information from the infected machine 9
  • 10. Browser Exploit Packs  Obfuscated JavaScripts used in BlackHole Infections ● Hiding the infected domain Obfuscated Script Deobfuscated Script 10
  • 11. Browser Exploit Packs  Plugin Detection Code ─ Scripts code taken from real world case studies PDF ActiveX Detection PDF Plugin Detection 11
  • 13. Drive-by-Download Attacks  Drive-by-Download ● Victim browser is forced to visit infected website ● Iframe redirects browser to the BEP ● Exploit is served by fingerprinting the browser environment ● Browser is exploited successfully using JavaScript Heap Spraying ● BEP silently downloads the malware onto the victim machine 13
  • 14. Drive-by-Download Frameworks  Drive-by-Download Frameworks ─ Java Drive-by Generator 14
  • 16. Spreaders  USB Spreading (Upas Bot - Case Study) ─ Inside USB Spreader – Widely used technique in bot design for infecting USB devices ─ Win 32 Implementation ● Bot calls RegisterDeviceNotificationW function » It can also be implemented as a windows service GUID for Raw USB Device 16
  • 17. Spreaders  USB Spreading (Upas Bot - Case Study) ─ Plug and Play (PnP) Devices have unique set of different GUIDs – Device interface GUID » Required for dbcc_classguid  DEV_BROADCAST_DEVICEINTERFACE – Device class GUID » Defines wide range of devices ● Defines WindowProc as follows » WM_DEVICECHANGE notification message in DEV_BROADCAST_HDR » dbch_devicetype  DBT_DEVTYP_DEVICEINTERFACE ● Wait for the USB device and triggers device-change event as follows: – wParam in WindowProc » DBT_DEVICEARRIVAL | DBT_DEVICEREMOVALCOMPLETE – Fetches drive letter of the USB devices as follows » dbcv_unitmask in _DEV_BROADCAST_VOLUME | Logical drive information ● Continued ……. 17
  • 18. Spreaders  USB Spreading (Upas Bot - Case Study) ─ On successful detecting the USB, bot execute function as follows; – CopyFileW to copy malicious executable in the USB drive – CreateFileW to create autorun.inf file in the USB root directory – SetFileAttributesW to apply required files attribute Autorun.inf infection 18
  • 19. Spreaders  USB Spreading (Upas Bot - Case Study) ─ Infecting USB devices using Malicious .LNK file infection .LNK infection 19
  • 20. Spreaders  USB Spreading (Upas Bot - Case Study) ─ Upas bot in action 20
  • 21. Spreaders  Upas Bot Network Behavior Detection ─ Writing signature specific to USB infection 21
  • 22. Social Networks Exploitation  Social Networks ─ Provide launchpads for spreading malware ─ Easy to trick users and force them to download malware. ─ Attackers exploit inherent design of social networks ● Example:- Likejacking in collaboration with Clickjacking 22
  • 25. Understanding Ruskill  What is Ruskill ? ─ A termed coined in Russia ● It refers to the group of warriors who demonstrate their skill in the battle ● Typically used by Diablo game players to demonstrate the strength and power ─ How does Ruskill is related to bots? ● Ruskill module is used to demonstrate the capability of bots ● Removing traces of malware in the system after successful reboot – Ruskill is also used with PDEF+ (Proactive Defense) 25
  • 26. Understanding Ruskill  Inside Ruskill Module ─ Detected in the NGR (Dorkbot) ─ Remote file downloading and execution ● Ruskill allows the bot to fetch any executable from third-party resource and execute it in the compromised system ─ Restoring System ● Ruskill monitors all the changes performed by the malicious executable in the system ● Ruskill restores the registry, files ad network settings to the same state ( before the execution of malicious binary) after reboot ● Deletes the malicious executable after successful execution in the system 26
  • 27. Understanding Ruskill  Inside Ruskill Module Ruskill Detecting File, DNS and Registry modifications 27
  • 29. Critical Problem - DNS Changer 29
  • 30. DNS Changer in Action  DNS Changer ─ Exploiting the DNS resolution functionality of the infected machine ─ What it works for ? ● Blocking security providers websites (Implementing blacklists) – For example: » Blocking microsoft.com updates website to restrict the downloading of updates » Restricting the opening of anti-virus vendors websites ● Redirecting the browser to the malicious domain – For example: » Forcing the infected machine to download updates from the malicious domain » Triggering chain infection for downloading another set of malware onto the infected system 30
  • 31. DNS Changer in Action  DNS Changer ─ How this works? ● Replacing the DNS server entries in the infected machine with IP addresses of the malicious DNS server ● Adding rogue entries in the hosts configuration file ● Executing DNS amplification attack by subverting the integrity of LAN devices such as routers and gateways – It results in DNS hijacking at a large scale in the network ● Hooking DNS libraries – The preferred method is Inline hooking in which detour and trampoline functions are created to play with DNS specific DLLs. 31
  • 32. DNS Changer in Action  DNS Changer ─ Inside DNS hooking ● Hooking DNS API – Hooking DNSQuery (*) function calls in dnsapi.lib/dnsapi.dll – Implemented by creating a blacklist – Bot hijacks the DNS resolution flow by filtering all the incoming DNS requests ● Hooking DNS Cache Resolver Service – Cache resolver service is used for DNS caching – Bot hooks sendto function in ws2_32.dll to verify the origin of DNS query to validate if sendto function is called by dnsrsslvr.dll 32
  • 33. DNS Changer in Action  DNS Changer ─ Implementation in NGR bot DNS Blocking DNS Redirection 33
  • 36. Downgrading Browser Security  Removing Protections ─ Nullifying browser client side security to perform stealthy operations ─ Internet Explorer ● Tampering zone values in the registry – SoftwareMicrosoftWindowsCurrentVersionInternet SettingsZones ─ Firefox ● Manipulating entries in user.js file – user_pref("security.warn_submit_insecure",false); » Browser does not raise an alert box when information in sent over HTTP while submitting forms. – user_pref("security.warn_viewing_mixed",false); » Remove the warning of supporting mixed content over SSL. OLD School trick but works very effectively. Several other techniques of subverting the browser security also exists 36
  • 37. Man-in-the-Browser (MitB)  Inside MitB ─ MitB typically refers to a userland rootkit that exploits the browser integrity 37
  • 38. What Lies Beneath? Note: The Pop up is triggered in user’s active session. So what it is actually? No doubt it is a Popup, but the technique is termed as Web Injects not phishing or something like that. 38
  • 39. Web Injects  Web Injects ─ Based on the concept of hooking specific functions in the browser DLLs ─ On the fly infection tactic ─ Execution flow ● Bot injects malicious content in the incoming HTTP responses ● Injections are based on the entries in the static file named as webinjects.txt ● Rules are statically defined by the botmaster ● Bot fetches rules from the webinjects.txt file and injects in the live webpages ─ Information stealing in a forceful manner ● Exploits user ignorance 39
  • 40. Web Injects  What is meant by GPH flags? ─ Exploitation and infection metrics ● G - injection will be made only for the resources that are requested by the GET ● P - injection will be made only for the resources that are requested by the POST ● L - is a flag for grabbing content between the tags data_before and data_after inclusive ● H – similar as L except the ripped content is not included and the contents of tags data_before and data_after 40
  • 41. Web Injects – Real Time Cases (1) Forceful Cookie Injection in Citibank’s website to manipulate the user’s session 41
  • 42. Web Injects – Real Time Cases (2) Injecting HTML content in Bank of America’s webpages to steal the ATM number and the Pass code. Injecting HTML content in Wells Fargo bank to steal user’s ATM code. 42
  • 43. Form Grabbing  Form Grabbing ─ It is an advanced technique of capturing information present in forms 43
  • 44. Form Grabbing  Why Form Grabbing ? ─ Keylogging produces plethora of data ─ Form grabbing – extracting data from the GET/POST requests ─ Based on the concept of hooking and DLL injection ─ No real protection against malware 44
  • 45. Form Grabbing  Harvested Data Harvested data from POST requests. Kaspersky’s anti virus license key entered by the user 45
  • 47. This Data is Not Yours ! All Browsers ! 47
  • 48. Conclusion  Botnets have become more robust and sophisticated  Significant increase in exploitation of browsers  HTTP has been used for data exfiltration  Botnets die hard 48
  • 49. Questions 49
  • 50. Thanks  DEF Con crew ─ http://www.defcon.org  SecNiche Security Labs ─ http://www.secniche.org ─ http://secniche.blogspot.com 50