十一屆全國(guó)政協(xié)委員職務(wù)和界別情況ppt課件_第1頁(yè)
十一屆全國(guó)政協(xié)委員職務(wù)和界別情況ppt課件_第2頁(yè)
十一屆全國(guó)政協(xié)委員職務(wù)和界別情況ppt課件_第3頁(yè)
十一屆全國(guó)政協(xié)委員職務(wù)和界別情況ppt課件_第4頁(yè)
十一屆全國(guó)政協(xié)委員職務(wù)和界別情況ppt課件_第5頁(yè)
已閱讀5頁(yè),還剩24頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Setiri: Advances in Trojan TechnologyRoelof TemminghHaroon MeerBlackHat USA 2002中醫(yī)免費(fèi)資料 zyy123/down. ScheduleIntroductionWhy Trojans?Brief History of Trojans & Covert ChannelsThe Hybrid modelSetiri: Advances in Trojan TechnologyDemonstrationTaking it furtherPossible fixes. IntroductionSensePostThe sp

2、eakersObjective of presentation. Why Trojans?Profile of Trojan usersReal criminalsdont write buffer overflowsThe weirdness of the industryExamples.Brief History of Trojans & Covert TunnelsTrojansFrom Quick Thinking Greeks to Quick Thinking GeeksTunnelsCovert Channels.Trojans. Valid IP No Filters Val

3、id IP Stateless Filters Private Addresses Stateful Filters Private + Stateful + IDS + Personal Firewalls + Content Checking + . Trojans. (Valid IP No Filters)“get real. Trojans. (Valid IP Stateless Filter) Dial Home TrojansRandom Ports / Open Ports / High Ports cDc ACK TunnelingArne Vidstrom. Trojan

4、s. (Stateful Filters)Back Orifice - GbotRattler. Brief History of Trojans & Covert TunnelsTrojansFrom Quick Thinking Greeks to Quick Thinking GeeksTunnelsCovert Channels. Tunnels & Covert Channels1985 TSC DefinitionCovert Channels1996 Phrack Magazine LOKI1998 RWWWShell THC1999 - HTTPTUNNEL GNU2000 -

5、 FireThru - Firethru. Conventional Trojans & how they failStateful firewall & IDSDirect modelDirect model with network tricksICMP tunnelingACK tunnelingProperly configured stateful firewallIRC agents +Authentication proxy tunnel +Personal firewall & Advanced Proxy tunnel with Authentication +. Hybri

6、d model: “GatSlagCombination between covert Tunnel and TrojanDefenses mechanisms today:Packet filters (stateful) / NATAuthentication ProxiesIntrusion detection systemsPersonal firewallsContent/protocol checkingBiometrics/Token Pads/One time passwordsEncryption.A typical network.How GatSlag workedRev

7、erse connection covert tunnelMicrosoft Internet Explorer as transport Controls IE via OLEEncapsulate in IE, not Receive commands in title of web pageReceive encoded data as plain text in body of web pageSend data with POST requestSend alive signals with GET request. Why GatSlag workedIntegration of

8、client with MS ProxyNTLM authenticationSSL capableRegistry changesPersonal firewallsJust another browserPlatform independentIE on every desktopSpecify ControllerVia public web page the MASTER site. How GatSlag worked IICreates invisible browserFind controller at MASTERSend request to ControllerIf no

9、 Controller & retry7, go to MASTERReceive replyParse reply:+ Upload file()+Download file+Execute commandLoop. Why defenses failFirewalls (stateful/NAT)Configured to allow user or proxy outContent level & IDSLooks like valid requests & repliesFiles downloaded as text in web pagesNo data or ports to l

10、ock on toSSL provides encryptionPersonal firewallsIE valid applicationConfigured to allow browsingAuthentication proxiesUser surf the web . Problems with GatslagThe Controllers IP can be obtained !Handling of multiple instancesGUI supportController needed to be onlineBatch commandsCommand historyMul

11、tiple controllersUpload facility not efficientPlatform supportStabilitySession level tunneling. Setiri: Advances in Trojan TechnologyDesign notes:Web site contains instructionsCGIs to create new instructionControllers interface:EXEC (DOS commands)TX (File upload)RX (File download)Directory structure

12、 each instanceTrojan “surfs to web site just a normal user would. Setiri: Advances in Trojan Technology IIAnonymityProblems with normal proxiesAlready using a proxyProxy logs“Cleaners provide anonymity“In browser proxy AnonymizerTrojan - Cleaner: SSLCleaner - Controller: SSLChallenges:Browser historyTemporary files. . . . Demonstration. Taking it furtherSession level tunneling.Flow control challengesHow this is different from tunnelingA browser is not a socketNo select on browserTrain modelThe Controller sideCannot “sendBuffering of data at ControllerThe Trojan sideMulti-part POSTsMul

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論