rootkits, backdoors, and trojans ece 4112 – lab 5 summary – spring 2006

27
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael Sanders

Upload: silas

Post on 19-Jan-2016

37 views

Category:

Documents


0 download

DESCRIPTION

Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006. Group 9 Greg Sheridan Terry Harvey. Group 10 Matthew Bowman Laura Silaghi Michael Sanders. Agenda. Rootkits User space vs. Kernel Space Detection Prevention Backdoors Different Implementations Detection - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Rootkits, Backdoors, and TrojansECE 4112 – Lab 5 Summary –

Spring 2006Group 9

Greg Sheridan

Terry Harvey

Group 10

Matthew Bowman

Laura Silaghi

Michael Sanders

Page 2: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Agenda• Rootkits• User space vs. Kernel Space• Detection• Prevention

• Backdoors• Different Implementations• Detection• Prevention

• Trojans

• Port & Web Knocking

Page 3: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Rootkits

“A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These

tools are intended to conceal running processes, files or system data, which helps

an intruder maintain access to a system without the user's knowledge.” -Wikipedia

Page 4: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsLrk4

• Linux user space• replaced system binaries

• /bin/login• Added user rewt• Added ‘global’ password satori

• /bin/ls• /dev/ptyr to hide files

Page 5: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsLrk4

• Detection• chkrootkit• matched “root”

• strace• # of system calls is dependent on location

• Prevention• Tripwire

Page 6: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsKnark

• Linux kernel space• redirected system calls

• Added /proc/knark/• Hiding Files• hidef/unhidef

• Redirecting Binaries• ered

• Other Knark functions?

Page 7: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsKnark• Detection• kern_check• Detected changes in SCT addresses

• rkhunter• Has a really bad aim

• chkrootkit• What trick could be used to detect Knark,

and how could this be avoided by Knark?

• Prevention• Tripwire• Disable LM

Page 8: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitssucKIT

• Linux user space• Redirected pointer to the SCT• Attacks kernel via what user file?

Page 9: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitssucKIT

• Detection• chkrootkitSearching for Suckit rootkit…

Warning: /sbin/init INFECTED

• chkprocPID 1443(/proc/1443): not in readdir output

PID 1443: not in ps output

You have 1 process hidden for readdir command

You have 1 process hidden for ps command

• Prevention• Any ideas?

Page 10: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsHacker Defender

• Windows• Changed memory segments and all

running processes’ behaviors

• Hide files

• Hide processes

• Hide services

• All TCP ports become potential backdoors!

Page 11: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsHacker Defender• Detection• Any anti-virus software• Why is this so?

• Rootkit Revealer• Compares Windows API vs. Registry Hive

on disk

• IceSword• Found the hidden files/folders, processes,

and services

• Prevention• Any ideas?

Page 12: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsFU

• Windows • via Direct Kernel Object Manipulation

• Hide processes

• Elevate process privileges

• Fake out Windows Event Viewer

• Hide device drivers

Page 13: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsFU

• Detection• Rootkit Revealer can’t see a thing

• Prevention• Any ideas?

Page 14: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

RootkitsPrevention/Detection Audits

• System binaries can’t be trusted

• BusyBox

• Other Linux bootable CD• Knoppix

Page 15: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Agenda• Backdoors and Trojans• Netcat• ICMP Backdoor• VNC• BO2K Backdoor• Backdoors in C• Backdoor Detection• ACK Tunneling • Trojans• Port/Web Knocking

Page 16: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Netcat• Netcat is a powerful TCP/IP protocol tool it

can be used as a backend tool that can be controlled by other programs or as a standalone server client.

• Server/Client• Program Control• File Transfer

• Relay• Tunneling• FIFO• Covering Tracks

Page 17: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

ICMP Backdoor• Server installed on an infiltrated

machine

• Uses the ICMP packet to hide malicious network traffic

• Why was the server echoing the commands back to the client?

Page 18: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Virtual Network Connection (VNC)

• A legitimate tool used by network administrators

• Gives access to all operations for the user that is remotely logged in

• Bad it hackers can gain access to a running VNC server

Page 19: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

BO2K Backdoor• Very well know windows backdoor• Server/Client• Many Predefined Functions• System Commands • Key Logging• GUI Commands • TCP/IP Commands • MS Networking • Process Control • Registry • Multimedia • File and Directory • File Compression

Page 20: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Backdoors in C

• Simple Linux telnet backdoor• 32 lines of code

• Intercepts the login • Look for backdoor password• If not entered goes to the original login

Page 21: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Backdoor Detection• Netcat, VNC, BO2K• Firewalls, Port scanning• Virus check• Process checking

• ICMP Detection• Packet Throughput• Turn off ICMP through gateways

• Backdoor in C• Checking for file integrity

Page 22: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Backdoor Dection Cont.. • TCPView• Scans for active ports • Provides info on process using the port• Path info/command used to start process

• Allows you to end running processes

Page 23: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

ACK Tunneling• Used to gain access to a computer

behind a firewall• Most system admin setup firewalls in

a way that will block most illegitimate Traffic

• All stateless firewalls allow ACK messages to pass• Majority of firewalls are stateless• Statefull firewalls keep the state of the

connections

• Sets ACK flag to gain access

Page 24: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Trojans

“… A malicious program that is disguised as legitimate software. … They may look useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.” ~Wikipedia

Page 25: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Trojans Cont…• eLitewrap• Wrapped a legitimate program with a

malicious program that is run in the background

• Don’t execute specious programs

• Look for specious processes running

• Explorer's Active X• Installed a backdoor from a webpage• Don’t allow Active X

Page 26: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Port/Web Knocking• Port Knocking• Blocks all ports but still allows access• Will open specified port when a correct Knock

sequence is preformed• Knock sequence

• Series of attempts to open certain ports

• Web Knocking• Is used where were web access is allowed

through the firewall• Invalid web Command are sent to the server

the are logged in the error log• A command script run intermittently runs to

execute the commands

Page 27: Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006

Questions?