endpoint security solutions

74
Endpoint Security Solutions USB Pratirodh Browser JS Guard AppSamvid Malware Nivarak Malware Resist Application and Device Control Workflow Analyser

Upload: others

Post on 11-Jan-2022

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Endpoint Security Solutions

Endpoint Security Solutions

• USB Pratirodh • Browser JS Guard • AppSamvid

•Malware Nivarak •Malware Resist •Application and Device Control •Workflow Analyser

Page 2: Endpoint Security Solutions

USB Pratirodh

Protects from unauthorized usage of USB devices

Page 3: Endpoint Security Solutions

Highlights of USBPratirodh

Blocking and unblocking of USB mass storage devices such as cameras, pen drives, mobiles, printers, external hard disks etc

Encryption and decryption of files and folders.

Virus detection and Autorun protection

User Authentication (only registered devices can be authenticated)

Verified and Certified by STQC

Page 4: Endpoint Security Solutions

Highlights of USBPratirodh

Supports Windows (windows xp sp3, Vista, 7, 8)

Sold licenses to IRISET, ISRO, ECIL, Heavy water plant, Headquarters 9 corps and C-DAC Mumbai.

Deployed at NAVY, DRDO, CERT-IN, CDAC-Bengaluru.

Page 5: Endpoint Security Solutions

Salient Features and Benefits

Whitelisting of USB Devices

User Authentication for accessing USB Devices

Malware Detection in USB storage Devices

Data Encryption for USB Storage Devices

Page 6: Endpoint Security Solutions

List of Attacks Addressed

Protect Against misuse of USB Devices

Protect against malware executing from USB Devices

Encryption protects data in case if device is lost

Page 7: Endpoint Security Solutions

Hardware and Software Requirements

Microsoft Windows XP(SP3) and above.

Recommended 100 MB of Hard disk space.

Page 8: Endpoint Security Solutions

Snapshots

Page 9: Endpoint Security Solutions

Snapshots

Page 10: Endpoint Security Solutions

Snapshots

Page 11: Endpoint Security Solutions

Potential user agencies / organizations

Any computer user or organization

Page 12: Endpoint Security Solutions

Browser JS Guard

Add-on for browsers to protect from JavaScript based malware

Page 13: Endpoint Security Solutions

Highlights of the Product

Detected the Malware which has not been detected by any other Anti-Malware solutions.

Validated and Certified by CERT-In Real-time code injection detection and prevention in the web

pages Everything we capture is happening in the wild (there is no

theory) Collects Little data and data reported is of high value Early warning and prevention Automatic product updates via Internet Designed as a Browser Extension and available in Popular web

browser repositories Consumption of minimal resources

Click here to see the Report

Page 14: Endpoint Security Solutions

Salient Features

Content/Heuristic based JS & HTML Malware protection

Alerts the User on visiting Malicious Web pages

Provides detailed analysis of webpage threats

Ease of installation

Page 15: Endpoint Security Solutions

Compatible Web Browsers

Web Browser Name Compatible with Version

Supported OS

Firefox >= 14.0 Windows & Linux

Google Chrome >= 14.0 Windows & Linux

Iceweasel >= 21.0 Windows & Linux

Opera >= 11.0 Windows & Linux

Internet Explorer = 9.0 Windows

Page 16: Endpoint Security Solutions

Value of the Product

Detects

– Client side Redirections

– Redirections through DOM changing functions

– Runtime JavaScript Code Injections

Page 17: Endpoint Security Solutions

Malicious Web Page Analysis and Detection through

Browser JS Guard

Page 18: Endpoint Security Solutions

Malicious Redirection Attack Vectors

Possible vectors are

– Hidden Activities

– Obfuscated JavaScript code

– Un Authorized Redirections

Page 19: Endpoint Security Solutions

Detection of Hidden Activities

Page 20: Endpoint Security Solutions

Exploits Through “brenz.pl”

www.brenz.pl - exploit site pre-loaded with an exploit kit called Eleonore. It is dangerous domain specially created to propagate

rogue program, Trojan horse, browser hijacker and it can lead to system freeze.

It may even cause things like identity theft, financial loss and permanent file deletion.

The main Indian site of Moneycontrol.com was compromised and injected with malicious code on November 6, 2010. The injected code redirected users to an exploit website “brenz.pl”.

Example URL is http://www.tradersbay.in/login.php

Page 21: Endpoint Security Solutions

Browser JS Guard - Detection of brenz.pl based attacks

Page 22: Endpoint Security Solutions

Browser JS Guard - Detection of brenz.pl based attacks

Page 23: Endpoint Security Solutions

Exploits Through “xanjan.cn”

www.xanjan.cn - collects the passwords on the site when user login into his account.

– Example infected URL is

• http://compass.co.in/achieve2003-2004.php

• Infection present in this website is

Page 24: Endpoint Security Solutions

Browser JS Guard - Detection of xanjan.cn based attacks

Page 25: Endpoint Security Solutions

Detection of Obfuscated JavaScript Code based Attacks

Page 26: Endpoint Security Solutions

Drive by Download Attack

http://feeds.feedburner.com/bileblog is an infected URL.

It drops JavaScript Trojan. This URL performs the redirection chain as

follows:

hxxp://rsnvlbgcba.ibiz.cc/d/404.php?go=1

▪ Intermediate Redirection

hxxp://fukbb.com/

▪ Final Redirection

Page 27: Endpoint Security Solutions

Analysis – Obfuscated Code

Page 28: Endpoint Security Solutions

Analysis – De Obfuscated Code

Page 29: Endpoint Security Solutions

Analysis

The de-obfuscated code loads an iFrame into the victim’s browser, which is redirecting the user to ‘hxxp://rsnvlbgcba.ibiz.cc/d/404.php?go=1’, which in turn redirects it to ‘hxxp://fukbb.com/’.

The source code hosted at intermediate site is a simple redirect.

Page 30: Endpoint Security Solutions

Final Redirected Page

Page 31: Endpoint Security Solutions

Browser JS Guard - Detection of Obfuscated JavaScript Code

Page 32: Endpoint Security Solutions

Detection of Un Authorized Redirection Attacks

Page 33: Endpoint Security Solutions

Infected URL

foto.kku.in is the infected URL It refers to malicious cross domains and attacks the user

Page 34: Endpoint Security Solutions

Browser JS Guard - Detection of UnAuthorized Redirections

Page 35: Endpoint Security Solutions

Detection Rate

Page 36: Endpoint Security Solutions

Potential user agencies / organizations

Any end system user

Page 38: Endpoint Security Solutions

AppSamvid

Application Whitelisting Solution

Page 39: Endpoint Security Solutions

Features

Whitelists .exe, .dll, .sys, .war, .jar and .class files

Automatic whitelisting of Windows Updates

Potential updater file(s) identification for 3rd party software’s

Installation mode – Supports installation of new software's

– To allow updating of applications

Folder scan option to add applications to database

Password based access to GUI

Password based uninstallation

1/23/2015 C-DAC 39

Page 40: Endpoint Security Solutions

List of Attacks Addressed

Protects against

– Zero day attacks

– Trojans

1/23/2015 C-DAC 40

Page 41: Endpoint Security Solutions

Technical Architecture

1/23/2015 C-DAC 41

Page 42: Endpoint Security Solutions

Hardware and Software Requirements

No extra hardware required

Works with Microsoft Windows

– XP SP3 onwards

– Requires minimum 5 MB of free hard disk space to maximum of 25 MB of hard disk space approx.

Requires mini-filter driver support by Microsoft Windows

1/23/2015 C-DAC 42

Page 43: Endpoint Security Solutions

Snapshot – Home screen

1/23/2015 C-DAC 43

Page 44: Endpoint Security Solutions

Snapshot – Edit screen

1/23/2015 C-DAC 44

Page 45: Endpoint Security Solutions

Snapshot – Settings screen

1/23/2015 C-DAC 45

Page 46: Endpoint Security Solutions

Snapshot – Logs screen

1/23/2015 C-DAC 46

Page 47: Endpoint Security Solutions

Potential user agencies

Industrial Control Systems

ATMs (Automated Teller Machines)

Point of Sale systems

Small Business Users

1/23/2015 C-DAC 47

Page 48: Endpoint Security Solutions

Malware Nivarak

Application Behaviour Whitelisting

Page 49: Endpoint Security Solutions

Objectives

Detects deviations at runtime from normal behaviour of modelled applications

Page 50: Endpoint Security Solutions

Features

Ability to prevent Zero-day attacks on modelled applications via

– File access Monitor

– Registry access Monitor

Co-exists with other Anti-virus solutions

Integrated Malware Resist

Page 51: Endpoint Security Solutions

Technical Architecture

Generate Model

Verify Model

Dynamic Policy Enforcement

GUI (Threat Alert)

Verification Policies

Applications Behavioral Heuristic Policies

Running Processes

Dynamic Model Enforcement

Execution

Trusted Models

success

Failure

Un-trusted Application

Page 52: Endpoint Security Solutions

Software Requirements

Microsoft Windows XP(SP3) and above.

Recommended 100 MB of Hard disk space.

Page 53: Endpoint Security Solutions

Bundled Application Models

with installer

By default, Malware Nivarak is bundled with

– Adobe Acrobat Reader (8 and 10)

– MS office 2007

– MS Excel

– MS Word

– MS Power point

Supports model generation of other applications

– One can generate model and enforce them at runtime.

Page 54: Endpoint Security Solutions

Other Software Measurements

Memory Foot Print: ~ 50 MB

Hard disk space: ~ 10 MB (depends on the applications model files)

Page 55: Endpoint Security Solutions

Malware Resist

Process Execution Control

Page 56: Endpoint Security Solutions

Details

Detects – Malicious processes at runtime

Salient Features and Benefits – Able to detect malware with its unique heuristic

technology – Capability to detect unknown malware – Protects from the malware before they do any harm to

your system – Easy to use – Even if your antivirus hasn’t detected a suspicious

process, you can quarantine it

Page 57: Endpoint Security Solutions

Malware Resist

• Classifies Processes (and monitors) in the system as

– Un-trusted

– user trusted processes

• Malicious behaviors which may cause damage to system

– 46 critical behaviors are monitored

57

Page 58: Endpoint Security Solutions

Some of the behaviors monitored

Code injection attempts

Packed executables

Changing security rights

Attempts to disable system tools

Installing a hidden service

Hidden processes

58

Page 59: Endpoint Security Solutions

Specifications

Processor - Pentium IV Processor onwards

RAM - 256 MB (recommended)

Hard Disk - 20 MB

OS - Windows XP SP2, SP3, Windows Vista

Page 60: Endpoint Security Solutions

Application and Device Control

Manage Applications And USB Mass Storage Devices In Your Domain

Network

Page 61: Endpoint Security Solutions

Introduction

ADC is centralized management console to manage client components in Windows Active Directory Domain Network

Integrates following components – AppSamvid functionality as Application Control

– Binary Heuristic Analysis

– Rootkit Detection Engine

– Browser JSGuard

– Malware Nivarak functionality as MPS

– USB Pratirodh functionality as Device Control

Page 62: Endpoint Security Solutions

Features

SSL enabled Web based management console

Remote Deployment of client components – requires domain administrator privileges

Supports Batch Installation of remote clients

Centralized Logging – using MSMQ (Microsoft Message Queuing)

Graphical Log Analysis

Page 63: Endpoint Security Solutions

Additional Features

Supports verifying application hashes with VirusTotal

Analysis of applications during scanning with heuristic application analyser

Supports Import/Export of whitelists

Remote registration of USB devices

Supports USB printers and scanners

Rootkit detection on Windows XP SP 2 and SP3 systems

Page 64: Endpoint Security Solutions

Technical Architecture

Application Control Server

Application Sandbox for Unknown Applications

Active Directory Environment

Client System

Remote Installation of Agent

Client Server Communication Scan Notification, Submit application details Logs etc.

Database (Whitelists/Policies)

1. Application whitelists 2. Device control policies

Enforcement of Policies

Application Control Agent

Device Control Agent

Device Control Server

Page 65: Endpoint Security Solutions

Minimum Hardware and Software Requirements

Server – Windows Server 2008 – Active Directory Environment – PostgreSQL 9.2 – Apache Web Server 2.2.x with PHP 5 – Minimum 500 MB hard disk space. (1 GB

Recommended)

Client – Microsoft Windows Vista and above. – Configured to use Active Directory. – Recommended 100 MB of Hard disk space.

Page 66: Endpoint Security Solutions

Snapshots – Application Control

Page 67: Endpoint Security Solutions

Snapshots – Device Control

Page 68: Endpoint Security Solutions

Snapshots – Deploy components

Page 69: Endpoint Security Solutions

Potential user agencies / organizations

Small to medium sized Enterprise networks

SCADA Environments

Page 70: Endpoint Security Solutions

Work flow Analyzer

Page 71: Endpoint Security Solutions

• Acts as a interceptor between web server and web client.

• Analyzes the state deviation attacks at run time execution of web application.

• Targeted attacks – Authentication bypass – Authorization bypass – Sequence bypass

• Works with 2 Phases – Learning Phase – Detection Phase

Work flow Analyzer

Page 72: Endpoint Security Solutions

Learning Phase

Page 73: Endpoint Security Solutions

Detection Phase

Page 74: Endpoint Security Solutions

Thank You