botnets, malware and network attacks

49
Botnets, malware and… …network attacks Pablo González Carmen Torrano Juan Antonio Calles

Upload: carmen-torrano-gimenez

Post on 08-Jun-2015

831 views

Category:

Technology


4 download

DESCRIPTION

Presentation about Flu project, malware, botnets and some network attacks. SBC2012

TRANSCRIPT

Page 1: Botnets, malware and network attacks

Botnets, malware and……network attacks

Pablo GonzálezCarmen Torrano

Juan Antonio Calles

Page 2: Botnets, malware and network attacks

I am…

• Carmen Torrano Giménez

• Phd Student at CSIC

• Research on Computer Security

• www.flu-project.com

Page 3: Botnets, malware and network attacks

I am…

• Pablo González (@fluproject)

• Head of security department

at Informatica 64

• www.flu-project.com

• www.seguridadapple.com

Page 4: Botnets, malware and network attacks

I am…

• Juan Antonio Calles (@jantonioCalles)

• Security Team Leader at Everis Spain

• elblogdecalles.blogspot.com

• www.flu-project.com

Page 5: Botnets, malware and network attacks

Timeline

What is Flu Project?

Malware and Botnets

Data Network Attacks!

Page 6: Botnets, malware and network attacks

What is…

Page 7: Botnets, malware and network attacks

What is… Flu?

Free Communit

y

Ethical Hacking

Social Awareness

Anti cybergrooming with Anti

Depredadores

Application development

Page 8: Botnets, malware and network attacks

Application development

• Flu• Anubis (footprinting and

fingerprinting)• Liberad a Wifi (default key

generation for Wifi routers)• Flunym0us (vulnerability scanner

Moodle, Wordpress)

Page 9: Botnets, malware and network attacks

Collaboration

Cybergrooming

Page 10: Botnets, malware and network attacks

So, Flu really is…

Knowledge… …Learning……Concepts…

…Security……Collaboration…

…Awareness…You… …Freedom

Page 11: Botnets, malware and network attacks

Malware

Page 12: Botnets, malware and network attacks

Malware Classes

• Viruses• Worms• Trojans• Rootkits• Spyware• Time bombs

Page 13: Botnets, malware and network attacks

Viruses

• They are only a kind of malware

• What is their goal? Destruction!

• Flu is not a virus

Page 14: Botnets, malware and network attacks

Virus Phases

Dormant

Propagation

Attack

Page 15: Botnets, malware and network attacks

Types…

• Boot

• Files

• Polymorphic

• Macro

Page 16: Botnets, malware and network attacks

Worms

• What are they?

• Key feature: Replication

• Flu is not a worm

Page 17: Botnets, malware and network attacks

Trojans

• What are they? Powerful!

• Remote control

• Direct and reverse

• Yeah! Flu is a trojan but……It’s a educational trojan

Page 18: Botnets, malware and network attacks

Rootkits

• What are they?

• Rootkit != management OR remote control software

• Key feature: they hide things…

Page 19: Botnets, malware and network attacks

Spyware

• What is it?

• Not harmful malware but attempts against privacy

• Key feature: Spy & Statistics

Page 20: Botnets, malware and network attacks

Time bombs

• What are they? Simple code but… destructive!

• Key feature: delayed action• Bash, Sh, Ksh, Dash, cmd, PowerShell

…• …And, Flu is not a time bomb

Page 21: Botnets, malware and network attacks

Botnets

Page 22: Botnets, malware and network attacks

Botnets

• What are they? • Bots, zombies, botmaster• Flu• Statistics: 10% of you belong to a

botnet!!• DOS attack – Anonymous (against

Internet censhorship- hacked CIA webpage)

Page 23: Botnets, malware and network attacks

Flu Features

• Hidden in the user folder, hidden process

• HaaS: Hacking as a Service

• Bot generator

• Client-server architecture

Page 24: Botnets, malware and network attacks

• WAMP (Windows, Apache, MySql

and PHP)

• Windows + .Net Framework

Page 25: Botnets, malware and network attacks

Flu architecture

Page 26: Botnets, malware and network attacks

Flu architecture

Page 27: Botnets, malware and network attacks

Flu Features

Keylogger Remote CMD & Powershell

Screenshot

Capture Microphone Steal Files Manageme

nt Registry

MSN Information

Web History

Passwords

And More…

Page 28: Botnets, malware and network attacks

Flu features

• Dynamic ID in XML file

• Commands directed to:– A specific computer– The whole botnet

Page 29: Botnets, malware and network attacks

Flu features

• AES encription (128 bits)• Hash of the files• GUI for Android• Undergraduate thesis at Deusto

University

Page 30: Botnets, malware and network attacks

Practical example

Page 31: Botnets, malware and network attacks

Dem

o

Page 32: Botnets, malware and network attacks

Data Network Attacks

Page 33: Botnets, malware and network attacks

1- Sniffing

Page 34: Botnets, malware and network attacks

PC HACKER

PC 1

PC 2 PC 3

PC 4

Sniffer

Filtra Filtra

Sniffing: hub

Hub

Datos PC 4

Page 35: Botnets, malware and network attacks

Sniffer

MAC 1

MAC 2 MAC H MAC 3

MAC 4

Port 1 MAC 1Port 2 MAC 2Port 6 MAC HPort 11 MAC 3Port 12 MAC 4

Sniffing: Switch

Switch

PC HACKER

PC 1

PC 2 PC 3

PC 4

Data PC 4

Page 36: Botnets, malware and network attacks

2- ARP Spoofing(MITM)

Page 37: Botnets, malware and network attacks

IP: MAC:

10.0.0.10 – ALICE 00:00:00:00:00:50 - ATTACKER

IP: MAC:

10.0.0.20 – BOB 00:00:00:00:00:50 - ATTACKER

Alice

IP: MAC:IP: MAC:IP: MAC:

10.0.0.20 – BOB 00:00:00:00:00:20 – BOB

IP: MAC:

10.0.0.10 – ALICE 00:00:00:00:00:10 – ALICE

Who is 10.0.0.20?

Who is 10.0.0.20?

10.0.0.20 is in 00:00:00:00:00:20

ARP Reply

ARP Request

10.0.0.10 is in

00:00:00:00:00:50

Bob

IP 10.0.0.50MAC 00:00:00:00:00:50

Eve

IP 10.0.0.10MAC 00:00:00:00:10

IP 10.0.0.20MAC 00:00:00:00:20

TABLA ARP ALICE TABLA ARP BOB

10.0.0.20 is in

00:00:00:00:00:50

Page 38: Botnets, malware and network attacks

Goals of MITM• Stealing:

– passwords

–hashes

–files

–sessions

Page 39: Botnets, malware and network attacks

Demo: MItM

Page 40: Botnets, malware and network attacks

3 - Hijacking

Page 41: Botnets, malware and network attacks

• Goal: Steal user identity/session (impersonation)

• Types: transport layer, application layer

• We focus on HTTP Communication

• Social Networks, Webmails…

Hijacking

Page 42: Botnets, malware and network attacks

Hijacking• I do not need your password!• HTTPs (authentication), HTTP

(rest of the session)• Insecure communications- Cookie Stolen… Ouch!• Firesheep

Page 43: Botnets, malware and network attacks

Demo: Hijacking

Page 44: Botnets, malware and network attacks

Finally…

Page 45: Botnets, malware and network attacks

Proud…

• Juanan and…

• “La biblia del Footprinting”

• Free!!!

Page 46: Botnets, malware and network attacks

…And Proud… :D

• Pablo and… his book

• “PowerShell: La navaja suiza de los administradores de sistemas”

• Sad… Not Free :(

Page 47: Botnets, malware and network attacks

Shopping!

• 5 Euros!• Really?? Yeah! • Finance… for Project!

Page 48: Botnets, malware and network attacks

Thank you!

Page 49: Botnets, malware and network attacks

www.flu-project.com

@fluproject@jantonioCalles@ctorranog

Grupo Flu Project

Grupo Flu Project

Feeds.feedburner.com/FluProject

Contact