80 of code red 2 code red 2 re re code red 1 and code red
play

80% of Code Red 2 Code Red 2 re-re- Code Red 1 and Code Red 2 - PowerPoint PPT Presentation

Slammer s Bandwidth-Limited Growth 80% of Code Red 2 Code Red 2 re-re- Code Red 1 and Code Red 2 Code Red 2 re- cleaned up due to released Jan 2004 Nimda endemic dies off released with Oct. onset of Blaster (and 2005; not since


  1. Slammer ’ s Bandwidth-Limited Growth �

  2. 80% of Code Red 2 Code Red 2 re-re- Code Red 1 and Code Red 2 Code Red 2 re- cleaned up due to released Jan 2004 Nimda endemic dies off released with Oct. onset of Blaster (and 2005; not since … ?) again 2003 die-off

  3. Code Red 2 re-re- Feb 7 2012! released Jan 2004 (and 2005; not since … ?)

  4. 2009 - 2010

  5. 2012

  6. 2013-2014

  7. Stuxnet : Slowly ramped up centrifuge speeds until they flew apart … … while feeding false readings to control system. Included 4 zero days for spreading

  8. Flame : General information stealer. Includes geolocation from local photos, taking screenshots, microphone access to capture local audio, recording Skype calls, download contacts from nearby BlueTooth devices. Exploited previously unknown MD5 hash collision vulnerability . Built-in autowipe “ kill switch ” .

  9. Gauss : Specifically targets banking transactions, mainly in Lebanon. Includes trapdoor looking for specific accounts, undeciphered to date.

  10. #!/usr/bin/perl while (<>) { chomp; if ( /^(get|post|options|head|...)(.*)/i ) { # Do not respond if it looks like an exploit last if length > 1000; my $date = gmtime; if ( $1 =~ /get|head/i ) print "HTTP/1.1 200 OK\r\n"; elsif ( $1 =~ /search/i ) print "HTTP/1.1 411 Length Required\r\n"; elsif ( $1 =~ /options/i ) { print "HTTP/1.1 200 OK\r\n"; print "DASL: \r\nDAV: 1, 2\r\n"; print "Public: OPTIONS, TRACE, GET, HEAD, DELETE, ...\r\n"; print "Allow: OPTIONS, TRACE, GET, HEAD, DELETE, ...\r\n"; } elsif ( $1 =~ /propfind/i ) print "HTTP/1.1 207 Multi-Status\r\n"; else print "HTTP/1.1 405 Method Not Allowed\r\n"; } print <<EOF; Server: Microsoft-IIS/5.0 Date: $date GMT Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDACBAABCQ=BHAMAEHAOAIHMOMGJCPFLBGO; path=/ Cache-control: private EOF last; } }

  11. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM VM VM VM

  12. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Dark space: blocks of otherwise VM VM VM unallocated addresses

  13. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Routers send dark space traffic either via VM VM VM tunnels or direct attachment

  14. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Gateway applies filtering to reduce load, allocates VM VM VM honeypot and mediates communication

  15. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Outbound communication attempted by a honeypot VM VM VM

  16. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM Outbound communication attempted by a honeypot VM VM VM can be redirected back to another honeypot

  17. GQ: Building a Large-Scale Honeyfarm • Honeyfarm : use a network telescope to route scan traffic to a set of honeypots • Goal: scale to 100,000s of monitored addresses … • … at high fidelity Physical Honeyfarm Servers GRE Tunnels Global or direct routing Internet Advertised Dark Space MGMT Gateway VM VM VM VM VM VM If redirected traffic again tries to communicate VM VM VM outbound, then we have found a worm

  18. Polymorphic Propagation Decryptor Key Encrypted Glob of Bits ê Decryptor Once running, worm Encryptor uses an encryptor with Key Main Worm Code a new key to propagate } Jmp ¡ ê Decryptor Key2 Different Encrypted Glob of Bits

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend