WRITING MULTI - PLATFORM SPYWARE *DISCLAIMER* this talk is about - - PowerPoint PPT Presentation

writing multi platform spyware disclaimer this talk is
SMART_READER_LITE
LIVE PREVIEW

WRITING MULTI - PLATFORM SPYWARE *DISCLAIMER* this talk is about - - PowerPoint PPT Presentation

WRITING MULTI - PLATFORM SPYWARE *DISCLAIMER* this talk is about techniques, not actions. You and ONLY you are responsible for what you do. MISSION: the job of spy ware, is to spy, the goal of the spy ware operator is to spy on humans... the


slide-1
SLIDE 1

WRITING MULTI - PLATFORM SPYWARE

slide-2
SLIDE 2

*DISCLAIMER* this talk is about techniques, not actions. You and ONLY you are responsible for what you do.

slide-3
SLIDE 3

MISSION:

the job of spy ware, is to spy, the goal of the spy ware operator is to spy on humans...

slide-4
SLIDE 4

the goal is simple, acquire as much data as possible, while remaining as hidden as possible.

slide-5
SLIDE 5

memory corruption disk writes "event" triggers network "volume" CPU load

slide-6
SLIDE 6

visible changes to the UX reverse engineering is an ever - present risk.

slide-7
SLIDE 7

TL;DR, ONCE YOUR TARGET SUSPECTS YOUR EXISTENCE, YOU LOSE.

slide-8
SLIDE 8

INTELLIGENCE GATHERING

slide-9
SLIDE 9

MEMORY PERSISTANCE

SHARED OBJECT INJECTION

PROCESS ENTER PTRACE SNAPSHOT OVERRIDE PT EXCEPTION SETUP NULL CALL REPLACE REGISTERS RESUME

slide-10
SLIDE 10

MEMORY PERSISTANCE

HOOKING SYSCALLS

PROCESS

yourCode() someSysCall()

slide-11
SLIDE 11

MEMORY PERSISTANCE

"THEY'RE IN THE KERNEL!"

slide-12
SLIDE 12

MEMORY PERSISTANCE

DLL INJECTION

CreateRemoteThread()

slide-13
SLIDE 13

MEMORY PERSISTANCE

HOOKING ON WINDOWS

SetWindowsHookEx() SetThreadContext() DLL redirection

slide-14
SLIDE 14

MEMORY PERSISTANCE

LDPRELOAD ON / DYLD_INSERT_LIBRARIES PROCESS MIGRATION

slide-15
SLIDE 15

MEMORY PERSISTANCE

MODIFY & REPLACE THE APP / LIB

then kill the original process (and restart it if required)

slide-16
SLIDE 16

MEMORY PERSISTANCE

AUTHOR: JOSHUA PITTS EMAIL: THE.MIDNITE.RUNR[A T]GMAIL<D O T>COM TWITTER: @MIDNITE_RUNR

ROOT@LOCALHOST:~# BACKDOOR-FACTORY

slide-17
SLIDE 17

MEMORY PERSISTANCE

INSTALL A WINDOWS SERVICE CRON LAUNCHD DLL REDIRECTION

slide-18
SLIDE 18

MEMORY PERSISTANCE

C:\Users\<user name>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup .bashrc ... init.d modification USB / CDROM autorun network connection auto run (Little Snitch, Microsoft GPO poising

slide-19
SLIDE 19

MEMORY PERSISTANCE

slide-20
SLIDE 20

DATA MINING

slide-21
SLIDE 21

DATA MINING

slide-22
SLIDE 22

DATA MINING

slide-23
SLIDE 23

DATA MINING

slide-24
SLIDE 24

DATA MINING

slide-25
SLIDE 25

DATA MINING

SSH, VPN, SSL, VNC, RDP, DOMAIN, etc, keys / certs key logger data password databases packet captures GPG, in - memory key tokens whats app signal tor SMIME bio - metric scanners etc...

slide-26
SLIDE 26

DATA PROCESSING

slide-27
SLIDE 27

DATA PROCESSING

slide-28
SLIDE 28

DATA PROCESSING

slide-29
SLIDE 29

DATA PROCESSING

slide-30
SLIDE 30

DATA PROCESSING

slide-31
SLIDE 31

DATA PROCESSING

ELASTICSEARCH

slide-32
SLIDE 32

DATA PROCESSING

STRINGS, SED, AWK, GREP, CUT, HEXDUMP, FILE, ETC...

slide-33
SLIDE 33

CONCLUSION

YOUR TARGETS ARE HUMANS, SO STUDY HUMANS DON'T RE INVENT THE WHEEL PRACTICE PRACTICE PRACTICE MULTIPLAYER IS ALWAYS BETTER