版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Setiri: Advances in Trojan TechnologyRoelof TemminghHaroon MeerBlackHat USA 2002中醫(yī)免費(fèi)資料 zyy123/down. ScheduleIntroductionWhy Trojans?Brief History of Trojans & Covert ChannelsThe Hybrid modelSetiri: Advances in Trojan TechnologyDemonstrationTaking it furtherPossible fixes. IntroductionSensePostThe sp
2、eakersObjective of presentation. Why Trojans?Profile of Trojan usersReal criminalsdont write buffer overflowsThe weirdness of the industryExamples.Brief History of Trojans & Covert TunnelsTrojansFrom Quick Thinking Greeks to Quick Thinking GeeksTunnelsCovert Channels.Trojans. Valid IP No Filters Val
3、id IP Stateless Filters Private Addresses Stateful Filters Private + Stateful + IDS + Personal Firewalls + Content Checking + . Trojans. (Valid IP No Filters)“get real. Trojans. (Valid IP Stateless Filter) Dial Home TrojansRandom Ports / Open Ports / High Ports cDc ACK TunnelingArne Vidstrom. Trojan
4、s. (Stateful Filters)Back Orifice - GbotRattler. Brief History of Trojans & Covert TunnelsTrojansFrom Quick Thinking Greeks to Quick Thinking GeeksTunnelsCovert Channels. Tunnels & Covert Channels1985 TSC DefinitionCovert Channels1996 Phrack Magazine LOKI1998 RWWWShell THC1999 - HTTPTUNNEL GNU2000 -
5、 FireThru - Firethru. Conventional Trojans & how they failStateful firewall & IDSDirect modelDirect model with network tricksICMP tunnelingACK tunnelingProperly configured stateful firewallIRC agents +Authentication proxy tunnel +Personal firewall & Advanced Proxy tunnel with Authentication +. Hybri
6、d model: “GatSlagCombination between covert Tunnel and TrojanDefenses mechanisms today:Packet filters (stateful) / NATAuthentication ProxiesIntrusion detection systemsPersonal firewallsContent/protocol checkingBiometrics/Token Pads/One time passwordsEncryption.A typical network.How GatSlag workedRev
7、erse connection covert tunnelMicrosoft Internet Explorer as transport Controls IE via OLEEncapsulate in IE, not Receive commands in title of web pageReceive encoded data as plain text in body of web pageSend data with POST requestSend alive signals with GET request. Why GatSlag workedIntegration of
8、client with MS ProxyNTLM authenticationSSL capableRegistry changesPersonal firewallsJust another browserPlatform independentIE on every desktopSpecify ControllerVia public web page the MASTER site. How GatSlag worked IICreates invisible browserFind controller at MASTERSend request to ControllerIf no
9、 Controller & retry7, go to MASTERReceive replyParse reply:+ Upload file()+Download file+Execute commandLoop. Why defenses failFirewalls (stateful/NAT)Configured to allow user or proxy outContent level & IDSLooks like valid requests & repliesFiles downloaded as text in web pagesNo data or ports to l
10、ock on toSSL provides encryptionPersonal firewallsIE valid applicationConfigured to allow browsingAuthentication proxiesUser surf the web . Problems with GatslagThe Controllers IP can be obtained !Handling of multiple instancesGUI supportController needed to be onlineBatch commandsCommand historyMul
11、tiple controllersUpload facility not efficientPlatform supportStabilitySession level tunneling. Setiri: Advances in Trojan TechnologyDesign notes:Web site contains instructionsCGIs to create new instructionControllers interface:EXEC (DOS commands)TX (File upload)RX (File download)Directory structure
12、 each instanceTrojan “surfs to web site just a normal user would. Setiri: Advances in Trojan Technology IIAnonymityProblems with normal proxiesAlready using a proxyProxy logs“Cleaners provide anonymity“In browser proxy AnonymizerTrojan - Cleaner: SSLCleaner - Controller: SSLChallenges:Browser historyTemporary files. . . . Demonstration. Taking it furtherSession level tunneling.Flow control challengesHow this is different from tunnelingA browser is not a socketNo select on browserTrain modelThe Controller sideCannot “sendBuffering of data at ControllerThe Trojan sideMulti-part POSTsMul
溫馨提示
- 1. 本站所有資源如無(wú)特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 黑臭水體治理合同(2篇)
- 南京航空航天大學(xué)《程序設(shè)計(jì)語(yǔ)言》2021-2022學(xué)年期末試卷
- 南京工業(yè)大學(xué)浦江學(xué)院《土木工程與環(huán)境》2021-2022學(xué)年第一學(xué)期期末試卷
- 南京工業(yè)大學(xué)浦江學(xué)院《汽車材料與成型技術(shù)》2022-2023學(xué)年第一學(xué)期期末試卷
- 《游子吟》說課稿
- 《我要的是葫蘆》說課稿
- 作業(yè)打卡課件教學(xué)課件
- 南京工業(yè)大學(xué)《有限元技術(shù)及其應(yīng)用》2023-2024學(xué)年第一學(xué)期期末試卷
- 南京工業(yè)大學(xué)《商務(wù)日語(yǔ)函電》2022-2023學(xué)年第一學(xué)期期末試卷
- 南京工業(yè)大學(xué)《景觀設(shè)計(jì)三》2022-2023學(xué)年第一學(xué)期期末試卷
- 氣象業(yè)務(wù)培訓(xùn)總結(jié)報(bào)告
- 閩教版2023版3-6年級(jí)全8冊(cè)英語(yǔ)單詞表
- 第8講+隋唐的文化
- 管網(wǎng)設(shè)計(jì)分析報(bào)告
- 珍愛生命拒絕危險(xiǎn)游戲
- 高中數(shù)學(xué)教師的專業(yè)發(fā)展路徑
- 《地球是怎樣形成的》課件
- 建筑機(jī)電系統(tǒng)全過程調(diào)試技術(shù)及工藝
- 六西格瑪之控制階段詳解
- 《領(lǐng)導(dǎo)梯隊(duì):全面打造領(lǐng)導(dǎo)力驅(qū)動(dòng)型公司》解讀
- 護(hù)理質(zhì)量安全與風(fēng)險(xiǎn)管理的案例分析
評(píng)論
0/150
提交評(píng)論