vijay krishnan avinesh dupat. a rootkit is software that enables continued privileged access to a...

16
Vijay Krishnan Avinesh Dupat ROOTKIT -MALWARE

Upload: charity-wilkerson

Post on 29-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Vijay Krishnan

Avinesh Dupat

ROOTKIT -MALWARE

Page 2: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications

The main purpose of a Rootkit is to make unauthorized modifications to the software in your PC

ROOTKIT

Page 3: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Provide an attacker full access via backdoor techniques.

Conceal other malware.Appropriate the compromised machine as

a zombie computer for attacks on other computers.

Non Hostile Rootkits-Anti-theft protection, Enforcement of DRM, Enhance emulation

software and security software

What is it used for?

Page 4: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

 Attacker identifies an existing vulnerability in a target system.

After gaining access to a vulnerable system, the attacker can install a rootkit manually. 

Can covertly steal user passwords, credit card information, computing resources, or to conduct other unauthorized activities without the knowledge of administrator

Rootkit Attack

Page 5: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Spyware : Modifying software programs for the purpose of infecting it with spyware. 

Backdoor :Modification that is built into a software program in your computer that is not part of the original design of the program

Byte Patching :Bytes are constructed in a specific order which can be modified by a rootkit

Source code modification :modifying the code in the PC's software right at the main source

MODUS OPERANDI

Page 6: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

User mode : Run on a computer through administrator privileges 

Kernel mode : Installed at the same level as the PCs operating system

Bootkits : A kernel-mode rootkit variant called a bootkit is used predominantly to attack full disk encryption systems

Firmware : Create malcode inside the firmware while you computer is shut down

Types of Rootkits

Page 7: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

ProactivePreventing the rootkit from being installedPreventing compromise in the first place

ReactiveDetecting the Rootkit after it has been installedRemoval of the Rootkit

Defensive Measures

Page 8: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

The first step in prevention of Rootkit is to run in less privileged user mode.

Use of the sc command in Windows XP. This locks up the Windows Service database.

Use HIPS (Host based Intrusion Prevention System) tool like AntiHook

Use a tool like Sandboxie which creates a sandbox like environment within which we can run any program

Rootkit Prevention

Page 9: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Very Difficult because Rootkit’s goal is to hide Antivirus products that have various levels

of success with detecting rootkits.Enumerate your system's contents and boot

up using a known-good operating system.Use of a packet sniffer, such as WinDump, or

a network firewall 

Rootkit Detection

Page 10: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Alternative trusted medium

Behavioral-based

Signature-based

Difference-based

Integrity checking

Memory dumps

Types of Rootkit Detection

Page 11: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Rootkit Detection tools -> Detect Rootkits Eg : Rootkit Revealer

Rootkit Removal tools -> Eliminates Rootkits from the user’s system

Eg : IceSword

RootKit Removal

Page 12: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Rootkit Revealer

Page 13: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

IceSword

Page 14: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

Rebuilding the System is the BEST solution!

Clean the infectionDisable rootkitBoot with clean CD and remove rootkit’s

resources

Removal

Page 16: Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators

THANK YOU!