Malware Analysis for the Enterprise jason ross
Số trang: 25
Loại file: pdf
Dung lượng: 654.09 KB
Lượt xem: 13
Lượt tải: 0
Xem trước 3 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
In a typical organization, an attack from malicious software (known as malware) is not likely togo completely unnoticed. Detection of an attack may come through one or more technologiessuch as antivirus software, intrusion detection systems, or it may come from systems compliancemonitoring.
Nội dung trích xuất từ tài liệu:
Malware Analysis for the Enterprise jason ross Malware Analysisfor the Enterprise jason rossTable of ContentsIntroduction......................................................................................................................................How Does Malware Analysis Help?................................................................................................. The Need For Analysis................................................................................................................. Times have changed (it’s a business, not a kiddie)....................................................................... The signature arms race................................................................................................................Where Does Malware Analysis Fit In?............................................................................................. Infection is an incident..................................................................................................................How Does Malware Today Work?................................................................................................... Droppers and Downloaders and Rootkits Oh My!........................................................................ How can you say you’re clean if you can’t trust the OS?.............................................................Playing With Fire (How To Analyze Malware)................................................................................ Static analysis........................................................................................................................... Runtime analysis....................................................................................................................... What is a sandnet?........................................................................................................................ Virtual Machines vs. Bare Metal.............................................................................................. Smart malware authors check for VM...................................................................................... Dumb malware authors also check for VM...............................................................................Setting Up The Sandnet.................................................................................................................... Network configuration.................................................................................................................. Monitoring and logging traffic...................................................................................................... Services Host Setup...................................................................................................................... OS Configuration...................................................................................................................... DNS Service (ISC Bind 9)........................................................................................................ Web Service (Apache 2)........................................................................................................... SMTP Service (Postfix)............................................................................................................ Generic Listener Service (Netcat)............................................................................................. A quick note about javascript obfuscation................................................................................ Victim Host Setup........................................................................................................................ OS Configuration...................................................................................................................... Analysis Software.....................................................................................................................Conclusion........................................................................................................................................Appendix A: Online Analysis Labs..................................................................................................Appendix B: Malware Sample Resources Online.............................................................................IntroductionIn a typical organization, an attack from malicious software (known as malware) is not likely togo completely unnoticed. Detection of an attack may come through one or more technologiessuch as antivirus software, intrusion detection systems, or it may come from systems compliancemonitoring.Unfortunately, detection of the attack is no longer sufficient to identify the full risk posed bymalware. Often, detection occurs after the host has already been compromised. As malwareevolves and grows increasingly complex, it is utilizing self-defense mechanisms such as root kittechnologies to hide processes from the kernel, disable antivirus software, and block access tosecurity vendor websites and operating system update information.Faced with these threats, once a host’s integrity becomes compromised a crucial part of theincident response process is to determine what activity the malicious code is engaged in, andspecifically whether any data may have been compromised and to where it may have been sent.How Does Malware Analysis Help?The Need For AnalysisThe only way to really determine what a piece of malicious software is doing is to analyze it. Theanti-virus industry has researchers who do this as a key part of their business. In the past this wassufficient, because the motivating factor behind viruses was largely fame. Because of this, viruseswe ...
Nội dung trích xuất từ tài liệu:
Malware Analysis for the Enterprise jason ross Malware Analysisfor the Enterprise jason rossTable of ContentsIntroduction......................................................................................................................................How Does Malware Analysis Help?................................................................................................. The Need For Analysis................................................................................................................. Times have changed (it’s a business, not a kiddie)....................................................................... The signature arms race................................................................................................................Where Does Malware Analysis Fit In?............................................................................................. Infection is an incident..................................................................................................................How Does Malware Today Work?................................................................................................... Droppers and Downloaders and Rootkits Oh My!........................................................................ How can you say you’re clean if you can’t trust the OS?.............................................................Playing With Fire (How To Analyze Malware)................................................................................ Static analysis........................................................................................................................... Runtime analysis....................................................................................................................... What is a sandnet?........................................................................................................................ Virtual Machines vs. Bare Metal.............................................................................................. Smart malware authors check for VM...................................................................................... Dumb malware authors also check for VM...............................................................................Setting Up The Sandnet.................................................................................................................... Network configuration.................................................................................................................. Monitoring and logging traffic...................................................................................................... Services Host Setup...................................................................................................................... OS Configuration...................................................................................................................... DNS Service (ISC Bind 9)........................................................................................................ Web Service (Apache 2)........................................................................................................... SMTP Service (Postfix)............................................................................................................ Generic Listener Service (Netcat)............................................................................................. A quick note about javascript obfuscation................................................................................ Victim Host Setup........................................................................................................................ OS Configuration...................................................................................................................... Analysis Software.....................................................................................................................Conclusion........................................................................................................................................Appendix A: Online Analysis Labs..................................................................................................Appendix B: Malware Sample Resources Online.............................................................................IntroductionIn a typical organization, an attack from malicious software (known as malware) is not likely togo completely unnoticed. Detection of an attack may come through one or more technologiessuch as antivirus software, intrusion detection systems, or it may come from systems compliancemonitoring.Unfortunately, detection of the attack is no longer sufficient to identify the full risk posed bymalware. Often, detection occurs after the host has already been compromised. As malwareevolves and grows increasingly complex, it is utilizing self-defense mechanisms such as root kittechnologies to hide processes from the kernel, disable antivirus software, and block access tosecurity vendor websites and operating system update information.Faced with these threats, once a host’s integrity becomes compromised a crucial part of theincident response process is to determine what activity the malicious code is engaged in, andspecifically whether any data may have been compromised and to where it may have been sent.How Does Malware Analysis Help?The Need For AnalysisThe only way to really determine what a piece of malicious software is doing is to analyze it. Theanti-virus industry has researchers who do this as a key part of their business. In the past this wassufficient, because the motivating factor behind viruses was largely fame. Because of this, viruseswe ...
Tìm kiếm theo từ khóa liên quan:
virus máy tính xử lý virus quy tắc bảo mật kỹ thuật máy tính thủ thuật máy tínhGợi ý tài liệu liên quan:
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 314 0 0 -
Làm việc với Read Only Domain Controllers
20 trang 303 0 0 -
Sửa lỗi các chức năng quan trọng của Win với ReEnable 2.0 Portable Edition
5 trang 213 0 0 -
Giáo trình Bảo trì hệ thống và cài đặt phần mềm
68 trang 207 0 0 -
UltraISO chương trình ghi đĩa, tạo ổ đĩa ảo nhỏ gọn
10 trang 203 0 0 -
Hướng dẫn cách khắc phục lỗi màn hình xanh trong windows
7 trang 202 0 0 -
Sao lưu dữ liệu Gmail sử dụng chế độ Offline
8 trang 201 0 0 -
Tổng hợp 30 lỗi thương gặp cho những bạn mới sử dụng máy tính
9 trang 201 0 0 -
Phần III: Xử lý sự cố Màn hình xanh
3 trang 201 0 0 -
Giáo Trình tin học căn bản - ĐH Marketing
166 trang 198 0 0