crouching admin, hidden hacker techniques for hiding and detecting traces paula januszkiewicz...

31
Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paul a Januszkiewicz Penetration Tester , MVP: Enterprise Security, MCT iDesign - CQURE: pa ula@ idesign.net

Upload: jacob-phelps

Post on 13-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Crouching Admin, Hidden HackerTechniques for Hiding and Detecting Traces

Paula JanuszkiewiczPenetration Tester, MVP: Enterprise Security, MCTiDesign - CQURE: [email protected]

Page 2: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Agenda

Accountability Idea Hiding & Detecting

1 2 3 4

Delivery & Launch Summary

Page 3: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Operating System Accountability

The above means that every step leaves some trace!

Windows 7 is designed to be used securelyAchieved Evaluation Assurance Level (EAL) 4+ certification that meets Federal Information Processing Standard (FIPS) #140-2Has C2 certification (Trusted Computer System Evaluation Criteria)Passed the Common Criteria Certification process

Page 4: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Agenda

Accountability Idea Hiding & Detecting

1 2 3 4

Delivery & Launch Summary

Page 5: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Operating System Logging Mechanisms

http://www.clearci.com

Event LogExtendableSupported by API

Plain text files (.log)

Kernel traces

Notifications

SQL (ODBC)

Application related

Page 6: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

http://stderr.pl/cqure/tools.zip

Page 7: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Logs Less & More Advanced

Page 8: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Hacker’s Delivery

htt

p:/

/ww

w.b

atw

inas.

com

Binaries are deliveredWith files from the InternetOn the removable mediaThrough LANThrough offline accessBy manipulating legitimate filesUsing vulnerabilitiesBuffer overflows

Page 9: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Replacing Files

Page 10: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

"Vulnerabilities"

Page 11: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Services & ACLs

Page 12: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Launching Evil Code

Cheating administrator

Using automated waysExplorerServicesDriversDLLs

Replacing files

Path manipulation

Injecting code

Hooking calls

Page 13: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Services (In)Security

Page 14: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

From A to Z - DLLs

Page 15: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Stuxnet Drivers

Page 16: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Areas of Focus

Problem: Too much information to control

Solution: Select areas with high probability of infection

DLLsServicesExecutablesDrivers

This attitude works as a first step

Page 17: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Agenda

Accountability Idea Hiding & Detecting

1 2 3 4

Delivery & Launch Summary

Page 18: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Dirty Games: Protection Mechanisms

Introduced in Windows VistaPart of Digital Rights Management

Protection is provided in two waysExtension to the EPROCESS structureSigning policy

ProtectedProcess bit

Page 19: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Protected Processes

Page 20: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Dirty Games: Hiding Mechanisms

Bypassing neighbored process objects

Pointing the pointernt!_eprocess ActiveProcessLinks manipulation

Does not affect software operation

Threads are still visible

Page 21: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Hidden Processes

Page 22: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Dirty Games: Hooks

http://www.lukechueh.com/

Allow to run our code instead of the system codeWork on running code

Allow to intercept API CallsDoes not require special privileges

Useful for developers… and for the ‘bad guys & girls’

Page 23: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Hooking

Page 24: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

3 of 10 Immutable Laws of Security

Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore

Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

Page 25: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

demo

Passwords In Operating System

Page 26: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Agenda

Accountability Idea Hiding & Detecting

1 2 3 4

Delivery & Launch Summary

Page 27: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Summary

Learn how to detect malicious situationsKnow your system when it is safe – you need a baseline

If you detect a successful attack – do not try to fight

Report the issueFormat your drive

Estimate the range of the attackKnow how to recover your data, when necessary

Page 28: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Related Content

Breakout Sessions (SIA203, SIA311, SIA304, SIA307)

Find Me Later At TLC

Page 29: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Resources

Connect. Share. Discuss.

http://europe.msteched.com

Learning

Microsoft Certification & Training Resources

www.microsoft.com/learning

TechNet

Resources for IT Professionals

http://microsoft.com/technet

Resources for Developers

http://microsoft.com/msdn

Page 30: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

Evaluations

http://europe.msteched.com/sessions

Submit your evals online

Page 31: Crouching Admin, Hidden Hacker Techniques for Hiding and Detecting Traces Paula Januszkiewicz Penetration Tester, MVP: Enterprise Security, MCT iDesign

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be

a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS

PRESENTATION.