d-cipher

19
Technophiles A seminar on computer security and protection D-CIPHER 1.0

Upload: sandeep-mahanthi

Post on 08-Jun-2015

581 views

Category:

Education


0 download

DESCRIPTION

Technophiles club nitrkl D-Cipher 1.0

TRANSCRIPT

Page 1: D-Cipher

Technophiles

A seminar on computer security

and protection

D-CIPHER 1.0

Page 2: D-Cipher

C o n t e n t s

Hacking with ROOT KITS

Hacking with Key loggers

• What is a Rootkit?• Different types of rootkits• Importance• Magnitude of damage• Counter measures

• What are Key loggers?• Different types of Key loggers• Magnitude of damage• Counter measures

Page 3: D-Cipher

ROOT KITSIf you cannot win the game

CHANGE THE GAME ITSELF!

Page 4: D-Cipher

What are Root kits? Root kits are software which give

privileged(admin) access to computer systems hiding themselves from actual administrators changing the rules of kernel and modify the way by which the operating system loads.

As you or me can only change or delete what we see….It is not possible for us to find a trace of root kit installed on our system.

Page 5: D-Cipher

Different types

• User mode• Kernel mode• Bootkits• Hypervisor level• Hardware type

Page 6: D-Cipher

Bootkits These are a type of root kit which are

designed to modify the boot process of operating systems.

They are used to attack full disk encryptions systems and bypass windows password system and thus gain administrator access.

Now, we are going to show you functioning of a bootkit and are going to bypass a windows password protected account.

Page 7: D-Cipher

Surprised?? Yeah, now you know that your systems

are not safe , But don’t worry .. We are not going to reveal the name of the bootkit we just used to ensure that neither your pc is hacked nor you would hack your friend’s…. ;-)

But people who are sincerely interested in hacking others computers may find it on the internet.

Page 8: D-Cipher

Many of the times when our PC gets infected with virus’ we do an antivirus scan.

While most of the time this may fix the problem, sometimes it doesn’t.

That implies that your system is infected with a rootkit virus and that you have to run a rootkit scan.

Counter MeasuresWays to fight Rootkits

Page 9: D-Cipher

Detection and Removal of a ROOTKIT Many Rootkits are very

difficult to detect by operating system mode programs which include antivirus’

Such type of rootkits can be detected by booting from an alternate medium and running a rootkit scan.

There are many other advanced detection systems for rootkits. Hackers who write rootkit codes target big companies and celebs for stealing data and for other financial gains.

Page 10: D-Cipher

McAfee’s Rookit Detective

Sophos Anti-Rootkit [Free]

RootRepeal - Rootkit Detector

Kaspersky Virus Removal Tool

Microsoft Malicious Software Removal Tool

Panda Anti-Rootkit and latest USB vaccine

Sysinternals Rootkit Revealer [for advanced users]

Removal tools for Rootkits

Page 11: D-Cipher

Key LoggersRecord and submit…

EVERYTHING!!

Page 12: D-Cipher

Key loggers track the keys struck on keyboard, mostly in a covert manner so that the user typing the keys is unaware that their actions are monitored.

Some key loggers can even take screenshots and access information copied to the clipboard

Key loggersKey = informationLog = Keep a record of

Different types:

Software basedHardware based

Page 13: D-Cipher

Malware based: A key logger can be present inside a virus Kernel based:Key logger written as a rootkit that has direct access to computer hardware Others:These include key loggers which are API based, Grabber based and Packet analyzers.

Software based Key loggersMainly three types:• Malware based• Kernel based• API based

Page 14: D-Cipher

Firmware based:A software is loaded in to BIOS to keep track of key strokes. Keyboard Hardware:A hardware is attached between keyboard and main system to record all that is typed on the keyboard.

Hardware based key loggersOut in the open!!

Page 15: D-Cipher

This explains…

Page 16: D-Cipher

Magnitude and type of damage

A software key logger can be installed remotely and can send back the logged information to a particular ip address or an e-mail or can broadcast data in different methods so that it would reach the hacker without being traced.

Hardware key loggers generally contain memory in which they store the logged information. This needs user’s physical access to the system which is risky

Page 17: D-Cipher

Once the hacker obtains the clear text, he can easily trace down the password and id’s of the target user and hence can steal or modify data and cause loss to the target.

Page 18: D-Cipher

Counter Measures

• Using a good antivirus or anti spyware• Using a KEY SCRAMBLER This is very useful as it encrypts information that is typed on keyboard . In this way, even if the hacker plants a spyware, He will have nothing but a computer code to decipher.• Using an ANTILOGGER This is also a good method to fight key loggers . These are the programs that detect Key loggers by their behavior and report them to the user.

Page 19: D-Cipher

Now you know you are Safe !!