SlideShare una empresa de Scribd logo
1 de 46
P0st-M0rt3m 0f 4 R00tk1t
                            4tt4ck
                                             Martin Khoo
                                              SingCERT
                                        markhoo@singcert.org.sg

23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   1
Agenda

                • Rootkit - a brief introduction
                • (WYSINWYG) - What you see is
                  NOT what you get
                • Preparing for autopsy………
                • Learning Points



23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   2
R00tK1t - what kit ? Kid ?
                • Not a toolkit to get “root”
                • Collection of tools to hide your
                  presence and keep the root
                  privileges
                • Typically intruders breakin through
                  a well known exploit and got “root”
                  already
                • Hard to find if you are not really
                  looking
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   3
R00tK1t - sysadmins beware
                • Works by relying on the trust that
                  sysadmins place on the output of
                  system commands
                • Trojanised common system
                  commands/programs
                         – local programs and network services
                • Trojanised programs
                         – ls - hide files
                         – ps - hide running processes
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   4
R00tK1t - WYSINWYG

                         – login - enter a magic password to get
                           root
                         – netstat - hides remote connections
                         – syslogd - omit logging of certain
                           connections and daemons
                         – ifconfig - hides presence of sniffer



23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   5
R00tK1t - cover-up and come back
next time
                • Will also contain other ancillary
                  programs like
                         – user access logfile cleaner ; removes
                           entries in wtmp, utmp
                         – logfile cleaner ; removes entries in
                           /var/log/messages, /var/log/secure
                         – a rootshell bound to a high port using
                           the “bindshell” program

23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   6
R00tK1t - how many ?

                • How many of such kits are
                  available ?
                         – Rootkit for SunOS 4.x (Solaris 1.x)
                           -old
                         – Linux RootKit (lrk4, lrk5)
                         – Windows rootkit (www.rootkit.com)
                • Mutations of the above; some
                  estimates put the number at 20+
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   7
The Discovery - what’s up dude?

                • We are in trouble
                         – email from a foreign site complaining
                           about an attack from one of the site’s
                           system
                         – The “ps” command on the suspected
                           machine exhibited strange behaviour
                            • started to reject certain legitimate option
                         – copied the “ps” command from another
                           machine and executed it on the suspect
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001    8
The Discovery - we hit pay dirt
                         – Unknown process was discovered
                           running a program
                            • /usr/man/.temp/autoroot - note the period
                              before temp
                         – dived into the directory and found
                           various programs stashed away there
                • The intruder directory contains
                         – exploit script for a well known RPC
                           buffer overflow vulnerability (statdx)
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   9
The Discovery - bad bad bad

                         – Scripts to scan Class A,B &C IP
                           networks for vulnerable “statd”
                         – “statdxmodauto” executable to
                           automatically break into vulnerable
                           systems found by the scanning scripts
                         – Ncftp script (evildata) to download a
                           magnumpower.tgz file from a remote
                           ftp site

23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   10
The Discovery - we will we will
DoS you…..
                • The Payload
                         – Downloaded the archive and extracted
                           the content
                         – contains trojanised copies of the
                           syslogd and login system programs
                         – collection of flooding tools to initiate
                           DoS attacks
                            • slice2, stream,raped,pong,syn5,syn6,
                            • installation script (install.sh)
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   11
The Autopsy - setting up
                • Forensic Analysis (FA)
                         – Hardware
                           •   RAM (128 MB)
                           •   disk space (2 x 9 GB, 1 x 6 GB SCSI)
                           •   1 x SCSI card
                           •   1 x tapedrive
                         – Software
                           • system tools (clean copy) - strings,ltrace
                           • The Coroner’s Toolkit (TCT)
                           • Encase Professional 2.0
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   12
The Autopsy - getting to the data

                • First rule of FA
                         – make an image copy of the hard drive
                           and work on the copy
                • List the partition table using
                         – fdisk -l /dev/<disk-id>
                • Mount the partitions with the
                  following options
                         – read-only,nodev,noexec
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   13
The Autopsy - manual analysis
           • Commence analysis with clean
             copies of system tools such as
                – strings - grep for ascii strings in binary
                – strace - trace the system calls, files
                  used by a program
           • Analysing the trojanised “ps”
             program using the strace program
                       – as expected it shows the typical rootkit
                         footprint ; presence of /dev/pty[pq]
                       – contains process names to NOT
23rd - 27th April 2001     BlackHat Asia 2001 - Copyright SingCERT 2001 14
                         display
The Autopsy - manual analysis
                • Running “strings” on the
                  “statdxmodauto” leads to very
                  interesting results.
                         •   Redhat Linux 6.2/6.1/6.0
                         •   statdx2 by ron1n <shellcode@hotmail.com>
                         •   Usage: %s [options] target
                         •   Available options:
                         •   <argument required> [default behavior]
                         •   attack the server using tcp [udp]
                         •   <port statd listens on> [query]
                         • ……………. <"command to execute">
                             [portbind]
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   15
The Autopsy - taking things apart

                • The program also set the HISTFILE
                  environment variable to /dev/null for
                  the root shell that it creates in a
                  compromised system
                • After breaking into a vulnerable
                  system it copies an install script
                  (install.sh) and start a cron job to run
                  the script <to continue>
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   16
The Autopsy - looking further
          • Strings on the trojanised
            “syslogd”yields the following:
              – access to a file /usr/include/kernlog.h
                which contains 3 lines
                  • telnetd
                  • tcpd
                  • sshd
                     – suspect that this file tells the syslogd
                       not to log connections for these 3
23rd - 27th April 2001
                       services 2001 - Copyright SingCERT 2001
                         BlackHat Asia                            17
The Autopsy - looking under the hood

                • Comparing the strace of the clean
                  and trojanised “login” program
                  reveals that
                         – HISTFILE environment variable is set
                           to /dev/null
                         – call to "/usr/lib/libnss_compat25.so”
                         – the clean program has a lot more
                           output for the strace run (error
                           checking etc)
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   18
The Autopsy - dissecting the script
                • Analysis of “inst.sh”
                         – remove immutable and append
                           attribute from the system syslogd
                           program
                         – copy the trojanised copy of syslogd
                           into system
                         – run chmod to give the new syslogd the
                           right owner and group
                         – add “immutable” flag back
                         – restart syslog from the rc script
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   19
The Autopsy - stay off my turf
                • Prevents other people from breaking
                  into the system by removing:
                         – rc scripts for rstatd and nfslock
                         – the /usr/sbin/rpc.statd and
                           /usr/bin/rpc.statd
                • Here is something interesting ; the
                  script next copies the system login
                  program to
                  /usr/lib/libnss_compat25.so”
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   20
The Autopsy - WYSINWYG
                • Next comes the copy of the
                  trojanised login into /bin/login
                • We know from the “strace” output
                  that the trojanised login calls the
                  /usr/lib/libnss_compat25.so
                • Replaced login calls the real login at
                  some stage after doing some cover-
                  up stuff
                • Removes the Tripwire directory
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   21
The Autopsy - let me in
                • Next modified /etc/inetd.conf to
                  enable “telnet”
                • The script screwed up because it
                  fails to detect that “telnet” is already
                  enabled
                • It moves the “telnet” line from the
                  top of the file to the back of the file -
                  another slip-up
                • Restarted inetd process
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   22
The Autopsy - the arsenal
              • Strings was ran against the DoS tools
                that came with the kit:
                    – slice2,synk5,synk6 - SYN flooder
                    – raped, stream- floods the host with ACKs
                      coming from random IPs with random
                      sequence numbers
              • Variation of some “base scripts” with
                different names and changes in
                behavior e.g. “spank” is a new breed
                of “stream/raped”- maybe to fool IDS
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   23
The Autopsy - slice and dice
          • Slice2
               • /lib/ld-
                    linux.so.2,__gmon_start__,libc.so.6,
                    printf,random,memcpy,perror,malloc,socket,f
                    printf,__deregister_frame_info,rand,signal,
                    htonl,sendto,gettimeofday,memset,time,getho
                    stbyname,sprintf,stderr,srandom,htons,exit,
                    atoi_IO_stdin_used,__libc_start_main,__regi
                    ster_frame_info,GLIBC_2.0,PTRhTQVh,
                    @[JSignal Caught. Exiting Cleanly.
                    [JSegmentation Violation Caught. Exiting
                    Cleanly.Unknown host %ssendto
               • Usage: %s srcaddr dstaddr low high            If
                    srcaddr is 0, random addresses will be
                    used,socket%i.%i.%i.%I, High port must be
                    greater than Low - Copyright SingCERT 2001
23rd - 27th April 2001   BlackHat Asia 2001 port.                 24
The Autopsy - raped
            • Raped
                 • /lib/ld-
                     linux.so.2,__gmon_start,__libc.so.6,printf,
                     random,memcpy,perror,socket,abort,__deregis
                     ter_frame_info,setsockopt,rand,signal,sendt
                     o,memset,srand,time,gethostbyname,htons,exi
                     t,atoi,_IO_stdin_used,__libc_start_main,__r
                     egister_frame_info,close,GLIBC_2.0,PTRhh::
                     exiting...-------------------:: raped.c by
                     lst
                 • usage: %s <dst> <ports><dst>                        -
                     destination host<ports> - ports to flood::
                     unknown host %s:: error: sending syn
                     packet:: destination host - %s::
                     destination port(s) - %d:: error: can not
                     open socket:: setsockopt:: raping...::
23rd - 27th April 2001
                     pressBlackHat Asia 2001 - Copyright SingCERT 2001
                            ^C to end...                                 25
Autopsy - what is the deal ?
                 • The rootkit also keeps track of the
                     vulnerable systems that it has
                     successfully broken into in a file
                     named “hackedsites” updated on a
                     daily basis
                 • File kept in the .temp directory
                 • At time of discovery the file has 50
                     IP addresses; majority in Korea and
                     Taiwan and some in US2001
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 26
Autopsy - time to blow the whistle
                • SingCERT immediately informed the
                  CERTs in Korea (KRCERT), Taiwan
                  (TWCERT) and CERT/CC of the
                  findings
                • They in turn sent out warning emails to
                  the registered owner of the respective
                  IP addresses
                • We kept the compromised system up
                  for a one more day before pulling the
                  plug
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   27
Autopsy - are we done yet ?

                • At this point we have a pretty good
                  idea of what the intruder did to the
                  system
                • We still don’t have a proper timeline
                  of the sequence of activities though
                • We also don’t know what else was
                  done to the system that might have
                  been missed by the manual analysis
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   28
Autopsy - calling in the coroner

                • No, we are not really done yet
                • The intent is to construct a timeline
                  of the sequence of events
                • Wanted to try out the latest release
                  (at that time 1.03) of the much
                  talked about The Coroner’s Toolkit
                  (TCT) by 2 big names in security -
                  Wietse Venema and Dan Farmer
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   29
Travel back in time
                • TCT consists of 6 programs:
                         – grave-robber - trawls the entire hard drive
                           sucking up data as it goes
                         – ils, mactime - list the modify,access and
                           change time of all files on the hard drive
                         – unrm, lazarus - process the free space on
                           the hard drive to recover deleted files
                         – findkey - recovers cryptographic keys
                           from a running process or from files.

23rd - 27th April 2001       BlackHat Asia 2001 - Copyright SingCERT 2001   30
Robbing the Grave

                • Ran grave-robber on the image copy
                  of the root partition
                • This prepares the input for the next
                  phase of the analysis
                • You can either make it trawl the
                  entire drive or specify a particular
                  partition if you know where the
                  information might be hiding
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   31
Walking the timeline
               • This phase uses the “mactime”
                    program to report the modification
                    information of all files on that
                    partition (or entire hard drive)
               • Need to specify a start date which
                    you suspect the compromise to have
                    taken place (ie tell it how far to look
                    back)
               • Pipe the output to a file for the next
                    phase Asia 2001 - Copyright SingCERT 2001
23rd - 27th April 2001   BlackHat                             32
Working with forceps and tweezers

                • Get a large bottle of Mountain Dew
                  and a bag of popcorns and fire up
                  your trusty editor
                • This is a manual process and you
                  are suppose to be looking for
                  something suspicious
                • We cheated here because we already
                  know what files to look for
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   33
Devil is in the details…...
                Oct 29 00 04:02:00 63855 m.. -rw------- root root
                /mnt/bla/var/log/cron.4
                               89067 m.. -rw------- root root
                /mnt/bla/var/log/messages.4
                Oct 29 00 04:02:01       0 m.. -rw------- root root /mnt/bla/
                var/log/spooler.3
                Oct 29 00 04:02:02 450842 m.. -rw-r--r-- root root /mnt/
                bla/var/log/httpd/error_log.4
                [MARK] - installation of trojanised login
                Oct 31 00 08:47:28 12495 ..c -rwxr-xr-x root root
                /mnt/bla/bin/login
                [MARK] - modification of inetd.conf - insert telnet service
                               2967 m.c -rw-r--r-- root root
                /mnt/bla/etc/inetd.conf
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001     34
We dig deeper…….
               [MARK] - unpacking the kit
               Nov 01 00 02:20:47 1024 m.. drwxr-xr-x 1004 users        /mnt/
               bla/tmp/syslogandmagnum/bin
               [MARK] - unpacking the kit
               Nov 01 00 02:28:36 1024 m.. drwxr-xr-x 1004 users        /mnt/
               bla/tmp/syslogandmagnum/magnum
               [MARK]
               Nov 01 00 03:41:56 3948 m.c -rw------- root root
               /mnt/bla/root/.ncftp/firewall
               [MARK] - installation of trojanised syslogd
               Nov 01 00 03:42:14 337140 ..c -rwxr-xr-x root bin
               /mnt/bla/sbin/syslogd
               [MARK] - unpacking the kit
               Nov 01 00 03:42:16 1024 m.. drwxr-xr-x 1004 users        /mnt/
               bla/tmp/syslogandmagnum
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001    35
One more time……..
               • We decided to put the disk through
                    one more round of investigation
                    using a commercial forensic tool :
                    Encase Professional
               • We were hoping to retrieve evidence
                    showing the replacement of the “ps”
                    command with the trojanised copy
               • We also do a search of the entire
                    hard drive using “magnumpower” as
                    the key word - Copyright SingCERT 2001
23rd - 27th April 2001   BlackHat Asia 2001                36
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   37
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   38
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   39
The autopsy report…...

                • We concluded from the analysis that
                  the compromise probably happened
                  sometime in Oct 31
                • The login and syslogd programs
                  were replaced with trojanised copies
                • We did not manage to capture the
                  replacement of the “ps” program

23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   40
How did this happen……?
                • The machine is a development
                  server with no perimeter protection
                  (what?)
                • It could have been compromised for
                  a long time before the owner was
                  notified (huh?)
                • They have wu-ftpd 2.6.1 running
                  and unpatched for the SITE EXEC
                  buffer overflow (aaaaaaaahhhhhh!)
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   41
Rest in peace ………..
                • The intruder made 2 mistakes which
                  made it easier to figure out what was
                  going on
                         – “ps” failing on a common option (-A)
                         – modifying inetd.conf unnecessarily
                         – did not clean-up after himself
                • The intruder was coming in from a few
                  ISPs in the US and we did try to
                  contact them (yeah right, as if we
                  expect something to happen!)
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   42
Learning Points…….
               • There is no such thing as an
                 unimportant online system
               • You need to manage your systems (and
                 that goes beyond rebooting once a day)
               • And yes there are people out there who
                 will not hesitate to break into your
                 system
               • Tripwire your system or run some form
                 of IDS (network and/or host)
23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   43
Learning Points………..
                • Check for rootkit periodically
                         – chkrootkit-0.21- application to check
                           for symptoms of rootkit infection
                         – not full-proof
                • We ran it against the compromised
                  system and it only flagged that “ps”
                  has been infected
                         – # chkrootkit -r /home/mnt/bin
                            • ROOTDIR is `/home/mnt/bin/'
                            • Checking `ps'... INFECTED
23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   44
Learning points…….

                • It also caught the presence of
                  “aliens” files
                         – # Checking `aliens'...
                            • Found /home/mnt/dev/ptyp




23rd - 27th April 2001      BlackHat Asia 2001 - Copyright SingCERT 2001   45
Thank You




23rd - 27th April 2001   BlackHat Asia 2001 - Copyright SingCERT 2001   46

Más contenido relacionado

La actualidad más candente

Introduction to char device driver
Introduction to char device driverIntroduction to char device driver
Introduction to char device driverVandana Salve
 
องค์ประกอบของคอมพิวเตอร์
องค์ประกอบของคอมพิวเตอร์องค์ประกอบของคอมพิวเตอร์
องค์ประกอบของคอมพิวเตอร์SPipe Pantaweesak
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at HomeE Hacking
 
Linux Conference Australia 2018 : Device Tree, past, present, future
Linux Conference Australia 2018 : Device Tree, past, present, futureLinux Conference Australia 2018 : Device Tree, past, present, future
Linux Conference Australia 2018 : Device Tree, past, present, futureNeil Armstrong
 
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGA BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGSilvio Cesare
 
U-boot and Android Verified Boot 2.0
U-boot and Android Verified Boot 2.0U-boot and Android Verified Boot 2.0
U-boot and Android Verified Boot 2.0GlobalLogic Ukraine
 
ELC-E 2019 Device tree, past, present, future
ELC-E 2019 Device tree, past, present, futureELC-E 2019 Device tree, past, present, future
ELC-E 2019 Device tree, past, present, futureNeil Armstrong
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203Linaro
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Neil Armstrong
 
Kernel Recipes 2017 - The Serial Device Bus - Johan Hovold
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldKernel Recipes 2017 - The Serial Device Bus - Johan Hovold
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldAnne Nicolas
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyFFRI, Inc.
 

La actualidad más candente (20)

Device Drivers
Device DriversDevice Drivers
Device Drivers
 
Introduction to char device driver
Introduction to char device driverIntroduction to char device driver
Introduction to char device driver
 
File000174
File000174File000174
File000174
 
Securitytools
SecuritytoolsSecuritytools
Securitytools
 
องค์ประกอบของคอมพิวเตอร์
องค์ประกอบของคอมพิวเตอร์องค์ประกอบของคอมพิวเตอร์
องค์ประกอบของคอมพิวเตอร์
 
Building Trojan Hardware at Home
Building Trojan Hardware at HomeBuilding Trojan Hardware at Home
Building Trojan Hardware at Home
 
Linux Conference Australia 2018 : Device Tree, past, present, future
Linux Conference Australia 2018 : Device Tree, past, present, futureLinux Conference Australia 2018 : Device Tree, past, present, future
Linux Conference Australia 2018 : Device Tree, past, present, future
 
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKINGA BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
A BEGINNER’S JOURNEY INTO THE WORLD OF HARDWARE HACKING
 
U-boot and Android Verified Boot 2.0
U-boot and Android Verified Boot 2.0U-boot and Android Verified Boot 2.0
U-boot and Android Verified Boot 2.0
 
File000125
File000125File000125
File000125
 
ELC-E 2019 Device tree, past, present, future
ELC-E 2019 Device tree, past, present, futureELC-E 2019 Device tree, past, present, future
ELC-E 2019 Device tree, past, present, future
 
File000127
File000127File000127
File000127
 
File000124
File000124File000124
File000124
 
Linux kernel modules
Linux kernel modulesLinux kernel modules
Linux kernel modules
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
Reliability, Availability, and Serviceability (RAS) on ARM64 status - SFO17-203
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
Elc Europe 2020 : u-boot- porting and maintaining a bootloader for a multimed...
 
Kernel Recipes 2017 - The Serial Device Bus - Johan Hovold
Kernel Recipes 2017 - The Serial Device Bus - Johan HovoldKernel Recipes 2017 - The Serial Device Bus - Johan Hovold
Kernel Recipes 2017 - The Serial Device Bus - Johan Hovold
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
 

Destacado

Phil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsPhil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsMarketing Festival
 
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 dandb-technology
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfJames Arlen
 
Understanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsUnderstanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsMike Ramsey
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Stephan Chenette
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfTifanija
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriHai Nguyen
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Tyler Shields
 
Introduction to Blackhat SEO
Introduction to Blackhat SEOIntroduction to Blackhat SEO
Introduction to Blackhat SEOMax Ogienko
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperViyat Bhalodia
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Blackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutBlackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutPhil Pearce
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ SuperweekPhil Pearce
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Securityeugenet
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in imagesAnge Albertini
 
Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Bahtiyar Bircan
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkSimon Bennetts
 

Destacado (20)

Phil Pearce - Blackhat analytics
Phil Pearce - Blackhat analyticsPhil Pearce - Blackhat analytics
Phil Pearce - Blackhat analytics
 
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
SearchCon 2016 | Black Hat Tools for White Hat SEO with Jim Kreinbrink, Cade ...
 
Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22 Blackhat 2014 Conference and Defcon 22
Blackhat 2014 Conference and Defcon 22
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
 
Understanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tacticsUnderstanding and Competing against Blackhat Local SEO tactics
Understanding and Competing against Blackhat Local SEO tactics
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
Your Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing YourselfYour Mind: Legal Status, Rights, and Securing Yourself
Your Mind: Legal Status, Rights, and Securing Yourself
 
Bh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleriBh us-03-ornaghi-valleri
Bh us-03-ornaghi-valleri
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Introduction to Blackhat SEO
Introduction to Blackhat SEOIntroduction to Blackhat SEO
Introduction to Blackhat SEO
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniper
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
Blackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printoutBlackhat Analytics - DarkScore test to printout
Blackhat Analytics - DarkScore test to printout
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
 
Faraday Blackhat 2011 Arsenal
Faraday Blackhat 2011 ArsenalFaraday Blackhat 2011 Arsenal
Faraday Blackhat 2011 Arsenal
 
prestiva_blackhat
prestiva_blackhatprestiva_blackhat
prestiva_blackhat
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
 
Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015Heybe Pentest Automation Toolkit - BlackHat USA 2015
Heybe Pentest Automation Toolkit - BlackHat USA 2015
 
BlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo TalkBlackHat 2014 OWASP ZAP Turbo Talk
BlackHat 2014 OWASP ZAP Turbo Talk
 

Similar a Khoo

Computer Forensics - Tracking the Cyber Vandals
Computer Forensics - Tracking the Cyber VandalsComputer Forensics - Tracking the Cyber Vandals
Computer Forensics - Tracking the Cyber VandalsAbhay Vaish
 
Invisible invasion
Invisible invasionInvisible invasion
Invisible invasiondefaison
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel ExploitationScio Security
 
Linux Perf Tools
Linux Perf ToolsLinux Perf Tools
Linux Perf ToolsRaj Pandey
 
Surge2014 talk - illumos State of the Community & POSIX Update
Surge2014 talk - illumos State of the Community & POSIX UpdateSurge2014 talk - illumos State of the Community & POSIX Update
Surge2014 talk - illumos State of the Community & POSIX UpdateGarrett D'Amore
 
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityAndroid Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityJoe Sylve
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsBrendan Gregg
 
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022MichaelM85042
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisktutorialsruby
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smartJeff Beley
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 

Similar a Khoo (20)

Computer Forensics - Tracking the Cyber Vandals
Computer Forensics - Tracking the Cyber VandalsComputer Forensics - Tracking the Cyber Vandals
Computer Forensics - Tracking the Cyber Vandals
 
Invisible invasion
Invisible invasionInvisible invasion
Invisible invasion
 
File000173
File000173File000173
File000173
 
Ch07
Ch07Ch07
Ch07
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel Exploitation
 
Linux Perf Tools
Linux Perf ToolsLinux Perf Tools
Linux Perf Tools
 
Surge2014 talk - illumos State of the Community & POSIX Update
Surge2014 talk - illumos State of the Community & POSIX UpdateSurge2014 talk - illumos State of the Community & POSIX Update
Surge2014 talk - illumos State of the Community & POSIX Update
 
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and VolatilityAndroid Mind Reading: Android Live Memory Analysis with LiME and Volatility
Android Mind Reading: Android Live Memory Analysis with LiME and Volatility
 
1483 Quayle
1483 Quayle1483 Quayle
1483 Quayle
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
 
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
 
Rhce ppt
Rhce pptRhce ppt
Rhce ppt
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Jonny_Martin-Asterisk
Jonny_Martin-AsteriskJonny_Martin-Asterisk
Jonny_Martin-Asterisk
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smart
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Khoo

  • 1. P0st-M0rt3m 0f 4 R00tk1t 4tt4ck Martin Khoo SingCERT markhoo@singcert.org.sg 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 1
  • 2. Agenda • Rootkit - a brief introduction • (WYSINWYG) - What you see is NOT what you get • Preparing for autopsy……… • Learning Points 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 2
  • 3. R00tK1t - what kit ? Kid ? • Not a toolkit to get “root” • Collection of tools to hide your presence and keep the root privileges • Typically intruders breakin through a well known exploit and got “root” already • Hard to find if you are not really looking 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 3
  • 4. R00tK1t - sysadmins beware • Works by relying on the trust that sysadmins place on the output of system commands • Trojanised common system commands/programs – local programs and network services • Trojanised programs – ls - hide files – ps - hide running processes 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 4
  • 5. R00tK1t - WYSINWYG – login - enter a magic password to get root – netstat - hides remote connections – syslogd - omit logging of certain connections and daemons – ifconfig - hides presence of sniffer 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 5
  • 6. R00tK1t - cover-up and come back next time • Will also contain other ancillary programs like – user access logfile cleaner ; removes entries in wtmp, utmp – logfile cleaner ; removes entries in /var/log/messages, /var/log/secure – a rootshell bound to a high port using the “bindshell” program 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 6
  • 7. R00tK1t - how many ? • How many of such kits are available ? – Rootkit for SunOS 4.x (Solaris 1.x) -old – Linux RootKit (lrk4, lrk5) – Windows rootkit (www.rootkit.com) • Mutations of the above; some estimates put the number at 20+ 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 7
  • 8. The Discovery - what’s up dude? • We are in trouble – email from a foreign site complaining about an attack from one of the site’s system – The “ps” command on the suspected machine exhibited strange behaviour • started to reject certain legitimate option – copied the “ps” command from another machine and executed it on the suspect 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 8
  • 9. The Discovery - we hit pay dirt – Unknown process was discovered running a program • /usr/man/.temp/autoroot - note the period before temp – dived into the directory and found various programs stashed away there • The intruder directory contains – exploit script for a well known RPC buffer overflow vulnerability (statdx) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 9
  • 10. The Discovery - bad bad bad – Scripts to scan Class A,B &C IP networks for vulnerable “statd” – “statdxmodauto” executable to automatically break into vulnerable systems found by the scanning scripts – Ncftp script (evildata) to download a magnumpower.tgz file from a remote ftp site 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 10
  • 11. The Discovery - we will we will DoS you….. • The Payload – Downloaded the archive and extracted the content – contains trojanised copies of the syslogd and login system programs – collection of flooding tools to initiate DoS attacks • slice2, stream,raped,pong,syn5,syn6, • installation script (install.sh) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 11
  • 12. The Autopsy - setting up • Forensic Analysis (FA) – Hardware • RAM (128 MB) • disk space (2 x 9 GB, 1 x 6 GB SCSI) • 1 x SCSI card • 1 x tapedrive – Software • system tools (clean copy) - strings,ltrace • The Coroner’s Toolkit (TCT) • Encase Professional 2.0 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 12
  • 13. The Autopsy - getting to the data • First rule of FA – make an image copy of the hard drive and work on the copy • List the partition table using – fdisk -l /dev/<disk-id> • Mount the partitions with the following options – read-only,nodev,noexec 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 13
  • 14. The Autopsy - manual analysis • Commence analysis with clean copies of system tools such as – strings - grep for ascii strings in binary – strace - trace the system calls, files used by a program • Analysing the trojanised “ps” program using the strace program – as expected it shows the typical rootkit footprint ; presence of /dev/pty[pq] – contains process names to NOT 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 14 display
  • 15. The Autopsy - manual analysis • Running “strings” on the “statdxmodauto” leads to very interesting results. • Redhat Linux 6.2/6.1/6.0 • statdx2 by ron1n <shellcode@hotmail.com> • Usage: %s [options] target • Available options: • <argument required> [default behavior] • attack the server using tcp [udp] • <port statd listens on> [query] • ……………. <"command to execute"> [portbind] 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 15
  • 16. The Autopsy - taking things apart • The program also set the HISTFILE environment variable to /dev/null for the root shell that it creates in a compromised system • After breaking into a vulnerable system it copies an install script (install.sh) and start a cron job to run the script <to continue> 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 16
  • 17. The Autopsy - looking further • Strings on the trojanised “syslogd”yields the following: – access to a file /usr/include/kernlog.h which contains 3 lines • telnetd • tcpd • sshd – suspect that this file tells the syslogd not to log connections for these 3 23rd - 27th April 2001 services 2001 - Copyright SingCERT 2001 BlackHat Asia 17
  • 18. The Autopsy - looking under the hood • Comparing the strace of the clean and trojanised “login” program reveals that – HISTFILE environment variable is set to /dev/null – call to "/usr/lib/libnss_compat25.so” – the clean program has a lot more output for the strace run (error checking etc) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 18
  • 19. The Autopsy - dissecting the script • Analysis of “inst.sh” – remove immutable and append attribute from the system syslogd program – copy the trojanised copy of syslogd into system – run chmod to give the new syslogd the right owner and group – add “immutable” flag back – restart syslog from the rc script 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 19
  • 20. The Autopsy - stay off my turf • Prevents other people from breaking into the system by removing: – rc scripts for rstatd and nfslock – the /usr/sbin/rpc.statd and /usr/bin/rpc.statd • Here is something interesting ; the script next copies the system login program to /usr/lib/libnss_compat25.so” 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 20
  • 21. The Autopsy - WYSINWYG • Next comes the copy of the trojanised login into /bin/login • We know from the “strace” output that the trojanised login calls the /usr/lib/libnss_compat25.so • Replaced login calls the real login at some stage after doing some cover- up stuff • Removes the Tripwire directory 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 21
  • 22. The Autopsy - let me in • Next modified /etc/inetd.conf to enable “telnet” • The script screwed up because it fails to detect that “telnet” is already enabled • It moves the “telnet” line from the top of the file to the back of the file - another slip-up • Restarted inetd process 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 22
  • 23. The Autopsy - the arsenal • Strings was ran against the DoS tools that came with the kit: – slice2,synk5,synk6 - SYN flooder – raped, stream- floods the host with ACKs coming from random IPs with random sequence numbers • Variation of some “base scripts” with different names and changes in behavior e.g. “spank” is a new breed of “stream/raped”- maybe to fool IDS 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 23
  • 24. The Autopsy - slice and dice • Slice2 • /lib/ld- linux.so.2,__gmon_start__,libc.so.6, printf,random,memcpy,perror,malloc,socket,f printf,__deregister_frame_info,rand,signal, htonl,sendto,gettimeofday,memset,time,getho stbyname,sprintf,stderr,srandom,htons,exit, atoi_IO_stdin_used,__libc_start_main,__regi ster_frame_info,GLIBC_2.0,PTRhTQVh, @[JSignal Caught. Exiting Cleanly. [JSegmentation Violation Caught. Exiting Cleanly.Unknown host %ssendto • Usage: %s srcaddr dstaddr low high If srcaddr is 0, random addresses will be used,socket%i.%i.%i.%I, High port must be greater than Low - Copyright SingCERT 2001 23rd - 27th April 2001 BlackHat Asia 2001 port. 24
  • 25. The Autopsy - raped • Raped • /lib/ld- linux.so.2,__gmon_start,__libc.so.6,printf, random,memcpy,perror,socket,abort,__deregis ter_frame_info,setsockopt,rand,signal,sendt o,memset,srand,time,gethostbyname,htons,exi t,atoi,_IO_stdin_used,__libc_start_main,__r egister_frame_info,close,GLIBC_2.0,PTRhh:: exiting...-------------------:: raped.c by lst • usage: %s <dst> <ports><dst> - destination host<ports> - ports to flood:: unknown host %s:: error: sending syn packet:: destination host - %s:: destination port(s) - %d:: error: can not open socket:: setsockopt:: raping...:: 23rd - 27th April 2001 pressBlackHat Asia 2001 - Copyright SingCERT 2001 ^C to end... 25
  • 26. Autopsy - what is the deal ? • The rootkit also keeps track of the vulnerable systems that it has successfully broken into in a file named “hackedsites” updated on a daily basis • File kept in the .temp directory • At time of discovery the file has 50 IP addresses; majority in Korea and Taiwan and some in US2001 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 26
  • 27. Autopsy - time to blow the whistle • SingCERT immediately informed the CERTs in Korea (KRCERT), Taiwan (TWCERT) and CERT/CC of the findings • They in turn sent out warning emails to the registered owner of the respective IP addresses • We kept the compromised system up for a one more day before pulling the plug 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 27
  • 28. Autopsy - are we done yet ? • At this point we have a pretty good idea of what the intruder did to the system • We still don’t have a proper timeline of the sequence of activities though • We also don’t know what else was done to the system that might have been missed by the manual analysis 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 28
  • 29. Autopsy - calling in the coroner • No, we are not really done yet • The intent is to construct a timeline of the sequence of events • Wanted to try out the latest release (at that time 1.03) of the much talked about The Coroner’s Toolkit (TCT) by 2 big names in security - Wietse Venema and Dan Farmer 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 29
  • 30. Travel back in time • TCT consists of 6 programs: – grave-robber - trawls the entire hard drive sucking up data as it goes – ils, mactime - list the modify,access and change time of all files on the hard drive – unrm, lazarus - process the free space on the hard drive to recover deleted files – findkey - recovers cryptographic keys from a running process or from files. 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 30
  • 31. Robbing the Grave • Ran grave-robber on the image copy of the root partition • This prepares the input for the next phase of the analysis • You can either make it trawl the entire drive or specify a particular partition if you know where the information might be hiding 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 31
  • 32. Walking the timeline • This phase uses the “mactime” program to report the modification information of all files on that partition (or entire hard drive) • Need to specify a start date which you suspect the compromise to have taken place (ie tell it how far to look back) • Pipe the output to a file for the next phase Asia 2001 - Copyright SingCERT 2001 23rd - 27th April 2001 BlackHat 32
  • 33. Working with forceps and tweezers • Get a large bottle of Mountain Dew and a bag of popcorns and fire up your trusty editor • This is a manual process and you are suppose to be looking for something suspicious • We cheated here because we already know what files to look for 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 33
  • 34. Devil is in the details…... Oct 29 00 04:02:00 63855 m.. -rw------- root root /mnt/bla/var/log/cron.4 89067 m.. -rw------- root root /mnt/bla/var/log/messages.4 Oct 29 00 04:02:01 0 m.. -rw------- root root /mnt/bla/ var/log/spooler.3 Oct 29 00 04:02:02 450842 m.. -rw-r--r-- root root /mnt/ bla/var/log/httpd/error_log.4 [MARK] - installation of trojanised login Oct 31 00 08:47:28 12495 ..c -rwxr-xr-x root root /mnt/bla/bin/login [MARK] - modification of inetd.conf - insert telnet service 2967 m.c -rw-r--r-- root root /mnt/bla/etc/inetd.conf 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 34
  • 35. We dig deeper……. [MARK] - unpacking the kit Nov 01 00 02:20:47 1024 m.. drwxr-xr-x 1004 users /mnt/ bla/tmp/syslogandmagnum/bin [MARK] - unpacking the kit Nov 01 00 02:28:36 1024 m.. drwxr-xr-x 1004 users /mnt/ bla/tmp/syslogandmagnum/magnum [MARK] Nov 01 00 03:41:56 3948 m.c -rw------- root root /mnt/bla/root/.ncftp/firewall [MARK] - installation of trojanised syslogd Nov 01 00 03:42:14 337140 ..c -rwxr-xr-x root bin /mnt/bla/sbin/syslogd [MARK] - unpacking the kit Nov 01 00 03:42:16 1024 m.. drwxr-xr-x 1004 users /mnt/ bla/tmp/syslogandmagnum 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 35
  • 36. One more time…….. • We decided to put the disk through one more round of investigation using a commercial forensic tool : Encase Professional • We were hoping to retrieve evidence showing the replacement of the “ps” command with the trojanised copy • We also do a search of the entire hard drive using “magnumpower” as the key word - Copyright SingCERT 2001 23rd - 27th April 2001 BlackHat Asia 2001 36
  • 37. 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 37
  • 38. 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 38
  • 39. 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 39
  • 40. The autopsy report…... • We concluded from the analysis that the compromise probably happened sometime in Oct 31 • The login and syslogd programs were replaced with trojanised copies • We did not manage to capture the replacement of the “ps” program 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 40
  • 41. How did this happen……? • The machine is a development server with no perimeter protection (what?) • It could have been compromised for a long time before the owner was notified (huh?) • They have wu-ftpd 2.6.1 running and unpatched for the SITE EXEC buffer overflow (aaaaaaaahhhhhh!) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 41
  • 42. Rest in peace ……….. • The intruder made 2 mistakes which made it easier to figure out what was going on – “ps” failing on a common option (-A) – modifying inetd.conf unnecessarily – did not clean-up after himself • The intruder was coming in from a few ISPs in the US and we did try to contact them (yeah right, as if we expect something to happen!) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 42
  • 43. Learning Points……. • There is no such thing as an unimportant online system • You need to manage your systems (and that goes beyond rebooting once a day) • And yes there are people out there who will not hesitate to break into your system • Tripwire your system or run some form of IDS (network and/or host) 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 43
  • 44. Learning Points……….. • Check for rootkit periodically – chkrootkit-0.21- application to check for symptoms of rootkit infection – not full-proof • We ran it against the compromised system and it only flagged that “ps” has been infected – # chkrootkit -r /home/mnt/bin • ROOTDIR is `/home/mnt/bin/' • Checking `ps'... INFECTED 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 44
  • 45. Learning points……. • It also caught the presence of “aliens” files – # Checking `aliens'... • Found /home/mnt/dev/ptyp 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 45
  • 46. Thank You 23rd - 27th April 2001 BlackHat Asia 2001 - Copyright SingCERT 2001 46