CIS 450 – Network Security
Download
Report
Transcript CIS 450 – Network Security
CIS 450 – Network
Security
Chapter 15 – Preserving Access
Backdoor – a way for an attacker to get back into a
network or system without being detected
Common ways to install backdoors
By opening a port and using a listening agent
Vision Port Scanner
http://linuxpr.com/releases/5354.html
Netcat
Tini – When I went to download the file I received a
message from my virus scanner that the .exe file has
a virus which was cured
Through the use of a Trojan program
Contains overt and covert programs
QAZ
Rootkits
What is it
http://www.linuxdevcenter.com/pub/a/linux/2001/12/14/rootkit.html
Trojanize key system files on the operating system
File-Level Rootkits
The legitimate program is replaced with the Trojan version
The legitimate program becomes the overt program and the backdoor
becomes the covert function
Programs replaced are the ones that a UNIX administrator would use –
page 548
Attacker can get back into system and hide his tracks
Operate at the application (user) level
Defending against
File-level rootkits can be discovered by looking for changes in binary
programs
Tripwire
Aide
Rootkits
Kernel-Level Rootkits
Operate at the kernel (operating system level)
By altering the heart of the operating system, kernel-level
rootkits enable attackers to create a system that appears
normal to users and administrators. In reality, the underlying
kernel is riddled with attacker modifications, all masked by
the manipulated kernel. Kernel-level rootkits usually include
the ability to redirect system calls, so when a user wants to
run one program--say, ps, netstat or ifconfig--a Trojanized
version is executed. These tools can also hide processes,
files, sniffer usage and network port usage by altering the
kernel so that it "lies" to you. Attackers are using numerous
kernel-level rootkits for Linux, Solaris and Windows, among
others.
Rootkits
Kernel-level rootkits – continued
Defending Against
Techniques used to defend against file-level rootkits don't work as well
on a system with a kernel-level rootkit, as all requests for information
go through the rotten kernel itself
While AIDE may show you that your login binary is intact, the kernellevel rootkit redirects execution to the attacker's backdoor
Defeating kernel-level rootkits requires hardening the kernels of critical
systems
Saint Jude Project monitors the integrity of a Linux kernel by
looking for modifications of the system call table
Can deploy machines with monolithic kernels created by building a
kernel that doesn't support loadable kernel modules
Hardening the kernel itself
Pittbull
Hardened versions of Unix and Unix-like OSes such as such as
SELinux3 and Sun Microsystems Trusted Solaris include additional
kernel protections
Note: Kernel-hardening solutions can be unwieldy if widely
deployed, because they alter the fundamental operation of the
kernel, complicating system administration and possibly breaking
third-party tools
UNIX Rootkits
File-level Rootkits
TrojanIT http://www.rishabhdara.com/link.php?currentgrp=30
Lrk5 - http://www.ossec.net/rootkits/lrk.php
Ark, Rootkit (This has a Trojan embedded in it, received
message from anti-virus software even though I did not
download it or open it), and Tk http://www.antiserver.it/Backdoor-Rootkit/
Kernel-level rootkits
Knark http://www.rishabhdara.com/link.php?currentgrp=30
Wrappers
A tool that combines two or more files into a single file, usually
for the purpose of hiding one of them.
Examples
SilkRope 2000 http://www.pestpatrol.com/pestinfo/s/silk_rope.asp
Saran Wrap http://pestpatrol.com/zks/pestinfo/s/saran_wrap_1_0.asp