SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Proof-Of-Concept:  Signature Based Malware Detection for  Websites and Domain Administrators - Anant Kochhar
[object Object],[object Object],Back Door, Key Logger, Botnet Zombie
 
Know them, “Trust” them
Drive-By Downloads AKA IFRAME and Script Injections
 
 
 
First Wave: Mass SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Payload Source: http://www.f-secure.com/weblog/archives/00001427.html
Affected Page With Rubbish Data
Source: http://www.scmagazineus.com/mass-sql-injection-attack-compromises-70000-websites/article/100497/ Source: http://www.scmagazineus.com/sql-attack-hits-125000-sites/article/159445/
Bulk of the spread: Self Propagation ,[object Object],[object Object],[object Object]
Movies College Fashion Sports .abc.xyz
 
PC Based Security for Malwares ,[object Object]
Movies College Fashion Sports .abc.xyz
 
 
Prevention … ,[object Object],[object Object],[object Object]
Indirect Risks: The Legitimate can also becomes Dangerous A Site B B Iframe Injection All internal and external users of the “clean” site A are also at risk now.
Accept the risk… the Alternative: Fast Detection and Quick Remedy ,[object Object],[object Object]
[object Object],[object Object]
2 Methods ,[object Object],[object Object]
Internal Scans ,[object Object],[object Object],[object Object],[object Object]
External Scans ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
fashion. abc.xyz efg.xyz ,[object Object],[object Object],[object Object],[object Object]
Behavior Analysis ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Signature Based ,[object Object],[object Object],[object Object],[object Object],[object Object]
Final Model ,[object Object],[object Object]
Ideally… ,[object Object],[object Object]
On A Positive Match ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you ,[object Object]

Weitere ähnliche Inhalte

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

nullcon 2010 - Signature based Malware Detection PoC for Websites

Hinweis der Redaktion

  1. This is a malware detection method for websites, not for end users/ victims.
  2. Malware, for this presentation, is a piece of code with intent to harm computer users. It maybe a back door, key logger, or a botnet client. End victims of malware are individuals and not websites.
  3. Attackers are always looking to deliver the malware to the victim. Maybe over WWW or may include techniques like infected USBs. The initial attacks were email based or through phishing sites. Now, they are using an alternative ‘trust’ based method- exploiting the trust that users have for ‘known’ websites. Malicious coders, working for RBN, create malware. These malware can be bought online. Example…- this is something I can work on.
  4. All are trusted names. There is implicit ‘trust’ when you visit their sites. Although not the end victim, these websites were victims of attacks. And they lost reputation.
  5. In the HTML source of the web pages, an ‘invisible’ redirection to a malicious site from where malware is downloaded. Note the obfuscation. The decoded URL: http: //chura.pl- one of the many malicious websites. This can also be a ‘script’ redirection- several variations of the same. How widespread is the problem?
  6. An attacked site.
  7. This is what the source looks like.
  8. With any of the above warning, a website loses reputation. Organizations lose reputations. Especially bad for ‘traffic-driven’ web based businesses. For banking websites, users will get keyloggers.
  9. Automated Tools discovered vulnerable pages and spray them with payloads which inserted scripts in databases. Scripts were inserted in all dynamic pages which picked up data from the corrupted database.
  10. The payload was encoded in hex to bypass IPS and IDS signatures.
  11. An infected page will look like the above, with lots of corrupted data as. With invisible redirections in the background.
  12. A medium sized domain with 4 sub domains. 4 sub domains= at least 4 separate web content administrators.
  13. The best Antivirus have less than 50% chance of catching the malware. Source: http://www.cyveillance.com/web/docs/WP_CyberIntel_H1_2009.pdf
  14. 1 of 4 content admin infected with malware. Entire domain is at risk of losing reputation.
  15. With any of the above warning, a website loses reputation. Organizations lose reputations. Especially bad for ‘traffic-driven’ web based businesses.
  16. How prevalent?
  17. Since almost all malwares are designed to exploit windows vulnerabilities, it is safer to use linux based systems.
  18. Site A links to Site B- Basis of the internet. Site B gets infected with Iframe Injection. All internal and external users of the “clean” site A are also at risk.
  19. Containing the spread is important if you are an internet bank. Protecting reputation is important if you are a web portal with a traffic driven revenue model.
  20. Multiple sources of signatures. Instead of dynamically comparing every external site with the new signatures, compare the entire list of external sites from the previous scan with new signatures. This will ensure that nothing gets missed.