SlideShare a Scribd company logo
1 of 49
從監聽門事件看資通訊安全演進
Evolution of ICT Security:
A Perspective From Wiretapping
林盈達
IEEE Fellow, IEEE ComSoC Distinguished Lecturer
交通大學資訊工程系
ydlin@cs.nctu.edu.tw
11-28-2013
1
2
 Areas of research interests
 Deep Packet Inspection
 Attack, virus, spam, porno, P2P
 Software, algorithm, hardware, SoC
 Real traffic, beta site, botnet
 Internet security and QoS
 Wireless communications
 Test technologies of switch, router, WLAN,
security, VoIP, 4G/LTE and smartphones
 Publications
 International journal: 95
 International conference: 51
 IETF Internet Draft: 1
 Industrial articles: 153
 Textbooks: 3 (Ying-Dar Lin, Ren-Hung Hwang,
Fred Baker, Computer Networks: An Open
Source Approach, McGraw-Hill, Feb 2011)
 Patents: 30
 Tech transfers: 8
 Well-cited paper: Multihop Cellular: A New
Architecture for Wireless Communications,
INFOCOM 2000, YD Lin and YC Hsu; #citations: 600;
standardized into IEEE 802.11s, Bluetooth, WiMAX,
and LTE
 B.S., NTU-CSIE, 1988; Ph.D., UCLA-CS, 1993
 Professor (1999~)/Associate Professor (1993~1999), NCTU-
CS; IEEE Fellow (2013); IEEE ComSoC Distinguished
Lecturer (2014&2015)
 Founder and Director, III-NCTU Embedded Benchmarking
Lab (EBL; www.ebl.org.tw), 2011~
 Founder and Director, NCTU Network Benchmarking Lab
(NBL; www.nbl.org.tw), 2002~
 Editorial Boards: IEEE Wireless Comm. (2013~), IEEE
Transactions on Computers (2011~), IEEE Computer
(2012~), IEEE Network (2011~), IEEE Communications
Magazine – Network Testing Series (2010~), IEEE
Communications Letters (2010~), Computer
Communications (2010~), Computer Networks (2010~) ,
IEEE Communications Surveys and Tutorials (2008~),
IEICE Transactions on Information and Systems
(11/2011~)
 Guest Editors of Special Issues: Open Source for
Networking, IEEE Network, Mar 2014; Mobile
Application Security, IEEE Computer, Mar 2014; Multi-
Hop Cellular, IEEE Wireless Communications, Oct 2014;
Deep Packet Inspection, IEEE JSAC, Q4 2014; Traffic
Forensics, IEEE Systems Journal, early 2015.
 CEO, Telecom Technology Center (www.ttc.org.tw),
7/2010~5/2011
 Director, Computer and Network Center, NCTU, 2007~2010
 Consultant, ICL/ITRI, 2002~2010
 Visiting Scholar, Cisco, San Jose, 7/2007-7/2008
 Director, Institute of Network Engineering, NCTU,
2005~2007
 Co-Founder, L7 Networks Inc. (www.L7.com.tw), 2002
林盈達 Ying-Dar Lin
3
Computer Networks: An Open Source Approach
considers why a protocol, designed a specific way, is
more important than how a protocol works. Key
concepts and underlying principles are conveyed
while explaining protocol behaviors. To further bridge
the long-existing gap between design and
implementation, it illustrates where and how protocol
designs are implemented in Linux-based systems. A
comprehensive set of fifty-six live open source
implementations spanning across hardware (8B/10B,
OFDM, CRC32, CSMA/CD, and crypto), driver
(Ethernet and PPP), kernel (longest prefix matching,
checksum, NAT, TCP traffic control, socket, shaper,
scheduler, firewall, and VPN), and daemon
(RIP/OSPF/BGP, DNS, FTP, SMTP/POP3/IMAP4, HTTP,
SNMP, SIP, streaming, and P2P) are interleaved with
the text.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, Computer
Networks: An Open Source Approach, McGraw-Hill,
Feb 2011.
www.mhhe.com/lin; available now at amazon.com
Facebook Q&A Communit: www.facebook.com/CNFBs
ISBN: 0-07-337624-8 / 978-007-337624-0
大綱
1. 監聽門的來龍去脈 20 mins
2. 電話與網路監聽的可能方式 20 mins
3. 網路通訊安全的演進歷程 20 mins
4. 最新網路駭客攻擊方式與解決技術 40 mins
5. Q&A 20 min
4
監聽門的來龍去脈
• 0972節費電話能否監聽?
– 三個政府單位(調查局, 刑事警察局, NCC)三個答
案: no(如果不事先知道是節費電話), yes, don‘t
know!
– 用戶端線路與局端線路之差異
– 0972630235 vs. (02)2358-5858
• 從電信機房到監聽機房
– 符合RFC3924之監聽設備
• 裁判vs.球員: 法院/監聽機房 vs. 調查單位
5
Centrex + PBX架構
CHT
Centrex
Switching
中華電信
虛擬總機
NEC
PBX
立法院
交換總機
2358-XXXX
1000
1001
1002
1003
分機
E1節費專線
(0972-630231~37)
• 用戶撥2358-XXXX,Centrex會將目的碼送給交換機,交換機會根據後四碼判斷
是要響鈴哪一隻分機。
• 分機撥出時,交換機會將2358(局碼)加上分機碼送出。
• 分機撥”0”時,NEC交換機會去抓E1節費專線,經由E1專線將通話送至CHT交換機,
撥出之電話雖設定為”沒有來話顯示“,但系統仍會紀錄為0972-630231~37的撥出
號碼,計價為”節費電話“之費率。
• 分機撥”*0”時,NEC交換機會去抓Centrex線,按平常的通信路由,將通話送至
CHT交換機,此時帶出的號碼會顯示Centrex的號碼,計價為“一般費率”。
6
0972630235 vs. (02)2358-5858
• 三種組合:
– 立法院內各分機立法院外:控制訊息攜帶
0972630235
• 要監聽與側錄!
– 立法院外(02)2358-5858立法院內各分機
• 無監聽與側錄
– 立法院外0972630235立法院內各分機
• 要監聽與側錄!
7
電話監聽方式
• 無遠端監聽系統:
– 監聽單位直接拿監聽票進機房於MDF(配線架)或在測量
台上直接掛線監聽。
• 遠端監聽系統:
– 所有一類電信公司(固網及手機運營商)及新的特二類業
者(節費公司)均已有供調查局或刑事警察局之遠端監聽
系統介接,但操作、管理、監聽內容儲存、處理之設
備均建置於情治單位。
– 一類電信運營商:一般由調查局負責監聽。
– 特二類(節費公司):一般由 刑事警察局負責監聽。
8
Lawful Intercept Architecture Reference Model
Law Enforcement
Agency (LEA)
Law Intercept
Administration Function
Intercept Related
Information (IRI) IAP
Mediation Device (MD)
Content Intercept
Access Point (IAP)
Service Provider
Functions
MD Provisioning
Interfaceb
HI1(a)
e
IRI (e)
HI2(g)
User Content User Content
c
Intercept Request (d)
f
Intercepted Content ( f)
HI3(h)
d
IETF RFC 3924 / ETSI ES 201671
9
A100 0 AX
CHT
Centrex
虛擬總機
E1 專線
NEC
PBX
C7
建置於固網或手機運營商機房
建置於情治單位
10
監聽只有電話不含網路?
• 網路也被掛線
– RFC3924也包含Data Services
– 大部分應用協定都沒加密
– 常見應用協定之封包辨識沒問題
– 可以錄製或即時同步播放
– P2P應用之封包辨識與解譯之誤判與漏判較高
11
裁判vs.球員:
法院/監聽機房 vs. 調查單位
• 電話與網路掛線人數?
– 三萬… anytime!
• 若每人被掛線平均六個月, 一年應該有六萬張監聽
票!! 但實際監聽票遠低於此數!
• 原因??
– 檢察官一張監聽票吃到飽 (wild card)
• 加掛不相干人等
• 法院失職!
– 球員兼裁判
• 球員: 檢察體系、調查局、刑事警察局
• 裁判: 法院、調查局、刑事警察局
• 調查局與刑事局辦案人員 <-> 調查局與刑事局監聽機房管理人
員
• 不能申請監聽票的情治監聽
• 機房應交給第三者管理! 12
"非法"電話與網路監聽的可能方式
• RFC3924標準監聽機房
– 與調查局機房合作
– 直接由調查局拉線到自建機房
• 直接與電信業者或網站業者合作
– A國政府向在A國經營的B國業者索取: 看A國市場大小
– A國政府向在B國經營的A國業者索取: 最容易
– A國政府向在B國經營的C國業者索取: 美國才作得到
• 無線與有線攔截
– 電纜攔截
– 無線攔截
• IMSI Catcher: Rohde & Schwartz 2003年專利, 2012年英國法院宣告失效
• Femtocatch: femtocell
• Bluejacking: Bluetooth, Wi-Fi, GPS, etc.
• 後門程式
– 手動: 安裝軟體(phone spy, call interception), 拷貝SIM卡
– 自動: 惡意程式 (malware)
13
直接與電信業者或網站業者合作
• 被電信業者或網站出賣?
– 電信業者已被RFC3924
– 用美國或日本的網站與社群較不會被出賣?
• 用當地國的業者一定被出賣
• 用敵對國的業者鐵定被出賣
• 用第三國的相對較不會
– 用Skype及Line絕對安全?
• 是的…. 如果它沒出賣你
– 乾脆用Bitmessage!
• Decentralized P2P
• 不會被出賣!
14
美國在各國之監聽
• 根據史諾登(Edward Snowden)給英國媒體的
資料
– 與當地政府監聽機房合作
– 與業者機房與網站合作
• 有線與無線攔截?
• 後門程式?
15
無線攔截
IMSI Catcher
• IMSI (International Mobile Subscriber Identity)
• A false mobile tower – man-in-the-middle attack
• Identify IMSI number and intercept through
protocol hacking – solicit/associate/configure/tap
– Masquerade as a base station and log IMSI numbers
of nearby handsets
– No authentication of base station by handset
– Downgrade to GSM
– Disable encryption (A5/0 mode)
16
Defcon: Hacker shows how he can intercept
cell phone calls with $1,500 device
• Chris Paget at Defcon in Las Vegas, 7-31-2010
• Demo video at
http://venturebeat.com/2010/07/31/hacker-
shows-how-he-can-intercept-cell-phone-calls-
for-1500/
17
Black Hat: Intercepting Calls and
Cloning Phones with Femtocells
• Ritter and DePerry at Black Hat in Las Vegas on
8-1-2013
• CDMA femtocell
• Femtocatch: 2.5-way call
18
後門程式
• 安裝軟體
– StealthGenie
– Wireflex
– Call Interceptor
– Spyera
• 拷貝SIM卡
– Phone cloning
– Read crypto key by SIM reader
– Install spyware on the target phone
• 惡意程式
– Repackaged applications
– Repackaged documents
19
StealthGenie
• Spy on their Calls
• Spy on their SMS Messages
• Track their GPS Location
• Read their Emails
• Spy on their Instant Messengers
• View their Multimedia Files
• Monitor their Internet Activities
• View their Contacts and Calendar
Activities
• Bug their phone
• Instant Alerts and Notifications
• Remotely Control their Phone
20
網路通訊安全的演進歷程
• 從伺服器到用戶端
• 從主動攻擊到被動傳播
• 從桌機與筆電到手機
• 從程式散播到文件搭載
21
General Security Issues
• Data security: protecting private data on the
public Internet
– Encryption & authentication  Virtual Private
Network (VPN)
• Access security: deciding who can access what
– TCP/IP firewall or application firewall
• System security: protecting system resources
from hackers
– Intrusion detection and prevention
– Malware detection and prevention
22
Vulnerability Exploiting on “Servers”
• Buffer overflow attack
– Put more data to the specified buffer to cause
buffer overflow
– Return address pointing to the cracked file to
execute
23
stack pointer
return address
buffer (200 bytes)
stack pointer
cracked file address
buffer (200 bytes)
. . . . . .
. . .
. . .
. . .
. . .
Put more data to buffer
then cause buffer
overflow
and point to the cracked
file address
void called()
{
. . .
char buffer[200];
. . .
}
Some Server Vulnerabilities
24
Vulnerabilities Application Version Reason
phf Remote Command Execution
Vulnerability
Apache Group Apache 1.0.3 Input Validation
Error
Multiple Vendor BIND (NXT
Oveflow) Vulnerabilities
ISC BIND 8.2.1 Buffer Overflow
MS IIS FrontPage 98 Extensions
Buffer Overflow Vulnerability
Microsoft IIS 4.0 Buffer Overflow
Univ. Of imapd Buffer Overflow
Vulnerability
imapd 12.264 Buffer Overflow
ProFTPD Remote Buffer Overflow Professional FTP proftpd 1.2pre5 Buffer Overflow
Sendmail Daemon Mode
Vulnerability
Eric Allman Sendmail 8.8.2 Input Validation
Error
RedHat Piranha Virtual Server
Package Default Account and
Password Vulnerability
RedHat Linux 6.2 Configuration Error
Wu-Ftpd Remote Format String
Stack Overwrite Vulnerability
wu-ftpd 2.6 Input Validation
Error
Open Source Implementation 8.7: Snort
25
 Three modes
 Sniffer
 Read and decode network packets
 Packet logger
 Log packets to disk
 Intrusion detection system
 Analyze traffic based on pre-defined rules
 Perform actions based upon what it sees
26
Writing Snort Rules
• Rule header
alert tcp any any - > 10.1.1.0/24 80
• Rule option
(content: “/cgi-bin/phf”; msg: “PHF probe!”;)
action protocol Source address
and port number
destination address
and port number
alert messageinspective part
Open Source Implementation 8.6:
ClamAV
• Introduction
– open-source package for virus scanning
– have detected over 570,000 malicious codes (viruses, worms and
trojans, etc.) with the release of 0.95.2 version
– Types of signatures
• MD5 for a certain PE section (part of an executable file)
• basic signatures of fixed strings (to be scanned in the entire file)
• extended signatures (in a simplified form of regular expressions
containing multiple parts
• logical signatures (multiple signatures combined with logical operators)
• logical signatures (multiple signatures combined with logical operators)
27
Block Diagrams of ClamAV
28
cl_load cli_load cli_cvdload
cli_loadmd5
cli_loadndb
cli_loadldb
cli_loadwdb
cli_loadpdb
cli_loaddb
cli_parseadd
cli_scanfile
cli_magic_scandesc
cli_scandesc
cli_scanrar
cli_unzip
cli_unzip
……
cli_ac_scanbuff
cli_bm_scanbuff
for signature matching
for signature loading
Performance Matters: Comparing Intrusion Detection,
Antivirus, Anti-Spam, Content Filtering, and P2P Classification
29
Snort DansGuardian ClamAV SpamAssassin L7-filter
Percentage
of string
matching
62% 86% 57% 31% 70%
Inspection
depth
Byte
jump
Http request /
response
All
attachment
content
Mail header/
body
First 10
packets
Distribution of Captured Malware: Active
Collection vs. Passive Collection
30
Others
21%
Worm
8%
Trojan
59%
Bot
12%
Honey-Inspector
Others
13%
Worm
3%
Trojan
5%
Bot
79%
Thepassivehoneypotsystem
(a) The distribution of captured
malware for Honey-Inspector
(b) The distribution of captured malware
for the passive honeypot system
• Active collection and passive collection are quite disjoint.
31
Attacker
C&C
Server
Bot
Bot
Victim
(2)C&C channel (3)Attack(1)Injection
Architecture of a Botnet
Distribution of Malware’s Capture Time
32
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Honey-Inspector
The passive honeypot system
The days that malware
signature existed
(Day)
Percentage of
captured time
(%)
• More zero-day malware can be collected “actively”.
Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai,
"How Different Are Malware Collected Actively and Passively?," IEEE Computer,
to appear in 2014.
0 10 20 30 40 50 60 70 80 90 100
Alters Windows Firewall
Checks For Debugger
Copies to Windows
Could Not Load
Creates DLL in System
Creates EXE in System
Creates Hidden File
Creates Mutex
Creates Service
Deletes File in System
Deletes Original Sample
Hooks Keyboard
Injected Code
Makes Network Connection
Modifies File in System
Modifies Local DNS
More than 5 Processes
Opens Physical Memory
Starts EXE in Documents
Starts EXE in Recycle
Starts EXE in System
Windows/Run Registry Key Set
Frequency of behaviors(%)
Behaviors
benign programs
malware
Behaviors by GFI Sandbox
1
2
3
4
5
6
7
8
9
10
11
12
33
• Some permissions are potentially more malicious than the others.
34
Top 20 Requested Permissions by Android Malware
• Again, some permissions are potentially more malicious than the others.
Malicious Behaviors
35
Benign behaviors
Suspicious behaviors
Malicious network behaviors
(intrusive behaviors)
Malicious behaviors (non-intrusive behaviors)
• Host behaviors
Non-intrusive behaviors
• Network behaviors
Intrusive behaviors
PC與Android行為、傳播、偵測方式比較
36
PC Android
行為  用戶端行為
資料檔案破壞、隱私竊取、
系統執行程序錯亂、佔用大
量的電腦資源
 網路端行為
網路擁塞
資料破壞、隱私竊取、
金融商業行為
傳播 超連結、電子郵件附件、P2P
軟體、USB/磁片/光碟
APK檔案
偵測方
式
Behavior-based detection &
Signature-based detection
Signature-based detection
APK檔案架構
37
APK檔案架構 說明
META-INF
(Directory)
Manifest.mf Manifest file
Cert.rsa Application certification
Cert.sf List of resources/SHA-1
Res (Directory) Resource used by APK(png/xml)
Resources.arsc List of resource locations
AndroidManifest.xml Android binary containing name, version,
permissions
Classes.dex Compiled source code
38
Trojan Rootkit Spyware Adware PuA Backdoor
Geinimi 
PJApps  
ADRD 
DroidDream  
droidKungFu 
SMS.FakeInst 
GGTracker 
J.SMSHider 
DroidDreamLight 
BgServ 
RogueSPPush 
NickySpy 
Toolbar.MywebSearch 
Ropin 
Trojan(對使用者的資料,做惡意的行為)、Rootkit(權限的更動)、Spyware(監聽
使用者隱私)、Adware(對使用者散播無意義廣告)、PuA(對使用者的手機資源
惡意使用)、Backdoor(利用程式中的後門,在使用者執行程式時竊取資料)
Android惡意程式行為及種類
39
APT 攻擊 vs. 傳統攻擊
APT Attacks Traditional Attacks
Persistent Yes No
Targeted Yes No
Planned Yes No
Custom exploits Yes No
Hidden Yes No
Motivation
Collect benefit information
and Exfiltration
Variable
最新網路駭客攻擊方式與解決技術
• 最新攻擊方式
– 殭屍電腦網路(botnet)
– 重新打包之應用程式(repackaged app)
– 進階持續性威脅(APT, Advanced Persistent Threat)
• 解決技術
– 特徵碼比對(signature matching)
– 行為分析(behavior analysis)
– 逆向工程(reverse engineering)
40
41
惡意程式偵測方法
Attributes
Methods
Execute File Fast/Slow Information Overhead Example tools
Static Analysis No Fast General Low ClamAV
Behavior Analysis Yes Slow General High
ViCheck.ca
Joe Sandbox
Reverse Engineering Partial Slow Detailed High Xecure
 Three methodologies for malware detection
 Static Analysis
 Behavior Analysis
 Reverse Engineering
42
樣本收集
– 300 APT samples
CVE Number File Type # Samples Product Vulnerability
CVE-2010-0188 PDF 48 Acrobat Reader
Adobe Reader PDF LibTiff Integer
Overflow
CVE-2010-2883 PDF 24
Acrobat
& Acrobat Reader
Adobe CoolType SING Table Stack Buffer
Overflow
CVE-2010-3333 RTF 52 Microsoft Office
MS Office 2010 RTF Header Stack
Overflow
CVE-2011-2462 PDF 25
Acrobat
& Acrobat Reader
Adobe Reader U3D Memory Corruption
CVE-2012-0158 RTF 131 Microsoft Office
Stack Buffer Overflow in
MSCOMCTL.OCX
CVE-2013-0640 PDF 20
Acrobat
& Acrobat Reader
Adobe Reader Unspecified Buffer
Overflow
43
Heap spraying
After heap spraying
0 MB
100 MB
200 MB
Normal heap layout
300 MB
Used memory :
Free memory :
0 MB
100 MB
200 MB
300 MB
Used memory :
Free memory :
Shellcode :
SAMPLE
malicious
pFragments
42%
Outside
structur
e 7%
2
regions
Datastore
+
outside
structure
2%
pFragments
+
outside
structure
18%
pFragments
+
Objdata 1%
pFragments
+
Datastore
2%
3
regions
pFragments+
Datastore+
outside
structure
benign
13%
Error
2%
Experiment 1: 逆向工程
Classifying samples by malware region
44
CVE-2010-3333
Experiment 2: 逆向工程
Classifying samples by malware region
45
Sample
benign
3.3%
malicious
pFragments
0.6%
Outside structure
19.6%
2 regions
pFragments
+outside structure
0.3%
Datastore +Objdata
0.3%
datastore+
outside structure
0.3%
Themedata +outside
structure
1%
Themedata +Objdata
5.6%
Objdata
+outside structure
39.6%
Objdata
7.3%
Themedata
21%
CVE-2012-0158
Experiment 3: 正向工程
Embedding malware into normal RTF
• After embedding:
1. malware is detected
2. context does not change
46
Malicious RTF
Sample
Normal RTF
file
Embedded
malicious code
RTF
context
context
shellcode
shellcode
APT總結
• APT的特點: 客製化樣本、匿蹤
• 偵測方法: 靜態、動態、逆向工程
• 在RTF文件塞惡意程式
– 加shellcode
– Where: pFragments, OBJDATA, Themedata,
Datastore, Outside structures
– 不同惡意程式用不同區塊
– 相同CVE的惡意程式也會用不同區塊
47
結論
• 電話與網路監聽氾濫
– 法規要將球員與裁判釐清
– 技術方法多元: RFC3924, 索取, 攔截, 後門
– 相關正反向產品有市場潛力
• 更高層次之資通訊安全
– 從伺服器到用戶端
– 從主動攻擊到被動傳播
– 從桌機與筆電到手機
– 從程式散播到文件搭載
• 個人自保之道?
48
Q&A
• Q1: 0972節費電話之分機不能被RFC3924監聽機房監聽。
• Q2: 電信業者不知道RFC3924監聽機房所監聽之對象為何。
• Q3: 加密過的行動電話之通話無法被無線攔截監聽。
• Q4: 通訊網路設備在通過安全檢測之後仍可經過韌體更新將後門程式
植入。
• Q5: 近年來的網路攻擊模式中主動的比率較被動高。
• Q6: 防毒軟體常常抓不到APT是因為: (1)沒有取得病毒樣本、(2)病毒會
變形以至於病毒碼比對不到、(3)沒有去動態執行文件檔中的macro程
式、(4)以上都可能。
• Q7: Honeypot收集惡意程式的特性: (1)主動收集主動傳播、(2)主動收
集被動傳播、(3)被動收集主動傳播、(4)被動收集被動傳播。
• Q8: 手機病毒目前最常見的傳播方式為: (1)主動傳播之程式、(2)主動
傳播之文件、(3)被動傳播之程式、(4)被動傳播之文件。
• Q9: 特徵碼比對、行為分析與逆向工程三者中何者有執行病毒程式: (1)
特徵碼比對、(2)行為分析、(3)逆向工程、(4)行為分析與逆向工程、(5)
特徵碼比對與行為分析、(6)特徵碼比對與逆向工程。
• Q10: 哪些資通訊產品使用習慣是高度危險的 (複選): (1)手機之
Bluetooth的default設定是打開、(2)手機借朋友、(3)別人可以看到你
Facebook的好友有哪些、(4)使用Line或Skype通訊、(5)使用WeChat通
訊、(6)在P2P網路尋找程式、音樂與遊戲。 49

More Related Content

What's hot

Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engRuo_Ando
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionAnant Narayanan
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
 
Curso: Redes y comunicaciones básicas: 03 VPN
Curso: Redes y comunicaciones básicas: 03 VPNCurso: Redes y comunicaciones básicas: 03 VPN
Curso: Redes y comunicaciones básicas: 03 VPNJack Daniel Cáceres Meza
 
OpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&COpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&CCourtland Smith
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)Sri Prasanna
 
Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Tiffany Hamburg Hamburg
 

What's hot (18)

Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Firewall
FirewallFirewall
Firewall
 
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-engPac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
 
Network security
Network securityNetwork security
Network security
 
VoIP
VoIPVoIP
VoIP
 
Botnets
BotnetsBotnets
Botnets
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
Botnets
BotnetsBotnets
Botnets
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Curso: Redes y comunicaciones básicas: 03 VPN
Curso: Redes y comunicaciones básicas: 03 VPNCurso: Redes y comunicaciones básicas: 03 VPN
Curso: Redes y comunicaciones básicas: 03 VPN
 
OpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&COpenDNS Whitepaper: DNS's Role in Botnet C&C
OpenDNS Whitepaper: DNS's Role in Botnet C&C
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)
 
Slideshare
SlideshareSlideshare
Slideshare
 
Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012Network Evolution, Standards, & Layered Architectures 2012
Network Evolution, Standards, & Layered Architectures 2012
 

Similar to 從監聽門事件看資通訊安全演進

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toasterguest66dc5f
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptabdullahalamin69
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
network connet
network connetnetwork connet
network connetreyvanth
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalHarold Sowards
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data DATA SECURITY SOLUTIONS
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceUltraUploader
 
WebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonWebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonAlan Quayle
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshopKathleen Ludewig Omollo
 

Similar to 從監聽門事件看資通訊安全演進 (20)

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Dror-Crazy_toaster
Dror-Crazy_toasterDror-Crazy_toaster
Dror-Crazy_toaster
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
network connet
network connetnetwork connet
network connet
 
Ist264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournalIst264 sowards h_chapter5labjournal
Ist264 sowards h_chapter5labjournal
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data Botprobe - Reducing network threat intelligence big data
Botprobe - Reducing network threat intelligence big data
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
 
WebRTC Standards from Tim Panton
WebRTC Standards from Tim PantonWebRTC Standards from Tim Panton
WebRTC Standards from Tim Panton
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 

More from Gemini Reich

這些年我們一起追的石虎S
這些年我們一起追的石虎S這些年我們一起追的石虎S
這些年我們一起追的石虎SGemini Reich
 
160728 蠻野講堂 尖峰用電管理
160728 蠻野講堂 尖峰用電管理160728 蠻野講堂 尖峰用電管理
160728 蠻野講堂 尖峰用電管理Gemini Reich
 
Legality and legal pluralism article j. platteeuw
Legality and legal pluralism article j. platteeuwLegality and legal pluralism article j. platteeuw
Legality and legal pluralism article j. platteeuwGemini Reich
 
1 introduction indigenous taiwan article j platteeuw
1 introduction indigenous taiwan article j platteeuw1 introduction indigenous taiwan article j platteeuw
1 introduction indigenous taiwan article j platteeuwGemini Reich
 
2016.07.14核二乾貯訴訟辯論庭暖身座談
2016.07.14核二乾貯訴訟辯論庭暖身座談2016.07.14核二乾貯訴訟辯論庭暖身座談
2016.07.14核二乾貯訴訟辯論庭暖身座談Gemini Reich
 
台灣人權簡史 簡報
台灣人權簡史 簡報台灣人權簡史 簡報
台灣人權簡史 簡報Gemini Reich
 
日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介Gemini Reich
 
日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介Gemini Reich
 
大飯核電判決全文
大飯核電判決全文大飯核電判決全文
大飯核電判決全文Gemini Reich
 
天和公園設計案
天和公園設計案天和公園設計案
天和公園設計案Gemini Reich
 
台北市文化資產審議運作方式
台北市文化資產審議運作方式台北市文化資產審議運作方式
台北市文化資產審議運作方式Gemini Reich
 
12大飯核電判決摘要(理由6至10)(doris)
12大飯核電判決摘要(理由6至10)(doris)12大飯核電判決摘要(理由6至10)(doris)
12大飯核電判決摘要(理由6至10)(doris)Gemini Reich
 
11大飯核電判決摘要(理由5)卓于綉
11大飯核電判決摘要(理由5)卓于綉11大飯核電判決摘要(理由5)卓于綉
11大飯核電判決摘要(理由5)卓于綉Gemini Reich
 
10大飯核電判決摘要(主文及理由1至4) (林惠琴)
10大飯核電判決摘要(主文及理由1至4) (林惠琴)10大飯核電判決摘要(主文及理由1至4) (林惠琴)
10大飯核電判決摘要(主文及理由1至4) (林惠琴)Gemini Reich
 
09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)Gemini Reich
 
09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)Gemini Reich
 
08大飯核電判決全文p50 59(陳麗珣)
08大飯核電判決全文p50 59(陳麗珣)08大飯核電判決全文p50 59(陳麗珣)
08大飯核電判決全文p50 59(陳麗珣)Gemini Reich
 
07大飯核電判決全文p44 50(林實芳)
07大飯核電判決全文p44 50(林實芳)07大飯核電判決全文p44 50(林實芳)
07大飯核電判決全文p44 50(林實芳)Gemini Reich
 
06大飯核電判決全文p38 43(陳麗珣)
06大飯核電判決全文p38 43(陳麗珣)06大飯核電判決全文p38 43(陳麗珣)
06大飯核電判決全文p38 43(陳麗珣)Gemini Reich
 

More from Gemini Reich (20)

這些年我們一起追的石虎S
這些年我們一起追的石虎S這些年我們一起追的石虎S
這些年我們一起追的石虎S
 
160728 蠻野講堂 尖峰用電管理
160728 蠻野講堂 尖峰用電管理160728 蠻野講堂 尖峰用電管理
160728 蠻野講堂 尖峰用電管理
 
Legality and legal pluralism article j. platteeuw
Legality and legal pluralism article j. platteeuwLegality and legal pluralism article j. platteeuw
Legality and legal pluralism article j. platteeuw
 
1 introduction indigenous taiwan article j platteeuw
1 introduction indigenous taiwan article j platteeuw1 introduction indigenous taiwan article j platteeuw
1 introduction indigenous taiwan article j platteeuw
 
2016.07.14核二乾貯訴訟辯論庭暖身座談
2016.07.14核二乾貯訴訟辯論庭暖身座談2016.07.14核二乾貯訴訟辯論庭暖身座談
2016.07.14核二乾貯訴訟辯論庭暖身座談
 
台灣人權簡史 簡報
台灣人權簡史 簡報台灣人權簡史 簡報
台灣人權簡史 簡報
 
日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介
 
日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介日本核電製造商國際訴訟訴狀譯文之譯者簡介
日本核電製造商國際訴訟訴狀譯文之譯者簡介
 
All
AllAll
All
 
大飯核電判決全文
大飯核電判決全文大飯核電判決全文
大飯核電判決全文
 
天和公園設計案
天和公園設計案天和公園設計案
天和公園設計案
 
台北市文化資產審議運作方式
台北市文化資產審議運作方式台北市文化資產審議運作方式
台北市文化資產審議運作方式
 
12大飯核電判決摘要(理由6至10)(doris)
12大飯核電判決摘要(理由6至10)(doris)12大飯核電判決摘要(理由6至10)(doris)
12大飯核電判決摘要(理由6至10)(doris)
 
11大飯核電判決摘要(理由5)卓于綉
11大飯核電判決摘要(理由5)卓于綉11大飯核電判決摘要(理由5)卓于綉
11大飯核電判決摘要(理由5)卓于綉
 
10大飯核電判決摘要(主文及理由1至4) (林惠琴)
10大飯核電判決摘要(主文及理由1至4) (林惠琴)10大飯核電判決摘要(主文及理由1至4) (林惠琴)
10大飯核電判決摘要(主文及理由1至4) (林惠琴)
 
09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)
 
09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)09大飯核電判決全文p60 67(小勞工)
09大飯核電判決全文p60 67(小勞工)
 
08大飯核電判決全文p50 59(陳麗珣)
08大飯核電判決全文p50 59(陳麗珣)08大飯核電判決全文p50 59(陳麗珣)
08大飯核電判決全文p50 59(陳麗珣)
 
07大飯核電判決全文p44 50(林實芳)
07大飯核電判決全文p44 50(林實芳)07大飯核電判決全文p44 50(林實芳)
07大飯核電判決全文p44 50(林實芳)
 
06大飯核電判決全文p38 43(陳麗珣)
06大飯核電判決全文p38 43(陳麗珣)06大飯核電判決全文p38 43(陳麗珣)
06大飯核電判決全文p38 43(陳麗珣)
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

從監聽門事件看資通訊安全演進

  • 1. 從監聽門事件看資通訊安全演進 Evolution of ICT Security: A Perspective From Wiretapping 林盈達 IEEE Fellow, IEEE ComSoC Distinguished Lecturer 交通大學資訊工程系 ydlin@cs.nctu.edu.tw 11-28-2013 1
  • 2. 2  Areas of research interests  Deep Packet Inspection  Attack, virus, spam, porno, P2P  Software, algorithm, hardware, SoC  Real traffic, beta site, botnet  Internet security and QoS  Wireless communications  Test technologies of switch, router, WLAN, security, VoIP, 4G/LTE and smartphones  Publications  International journal: 95  International conference: 51  IETF Internet Draft: 1  Industrial articles: 153  Textbooks: 3 (Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, Computer Networks: An Open Source Approach, McGraw-Hill, Feb 2011)  Patents: 30  Tech transfers: 8  Well-cited paper: Multihop Cellular: A New Architecture for Wireless Communications, INFOCOM 2000, YD Lin and YC Hsu; #citations: 600; standardized into IEEE 802.11s, Bluetooth, WiMAX, and LTE  B.S., NTU-CSIE, 1988; Ph.D., UCLA-CS, 1993  Professor (1999~)/Associate Professor (1993~1999), NCTU- CS; IEEE Fellow (2013); IEEE ComSoC Distinguished Lecturer (2014&2015)  Founder and Director, III-NCTU Embedded Benchmarking Lab (EBL; www.ebl.org.tw), 2011~  Founder and Director, NCTU Network Benchmarking Lab (NBL; www.nbl.org.tw), 2002~  Editorial Boards: IEEE Wireless Comm. (2013~), IEEE Transactions on Computers (2011~), IEEE Computer (2012~), IEEE Network (2011~), IEEE Communications Magazine – Network Testing Series (2010~), IEEE Communications Letters (2010~), Computer Communications (2010~), Computer Networks (2010~) , IEEE Communications Surveys and Tutorials (2008~), IEICE Transactions on Information and Systems (11/2011~)  Guest Editors of Special Issues: Open Source for Networking, IEEE Network, Mar 2014; Mobile Application Security, IEEE Computer, Mar 2014; Multi- Hop Cellular, IEEE Wireless Communications, Oct 2014; Deep Packet Inspection, IEEE JSAC, Q4 2014; Traffic Forensics, IEEE Systems Journal, early 2015.  CEO, Telecom Technology Center (www.ttc.org.tw), 7/2010~5/2011  Director, Computer and Network Center, NCTU, 2007~2010  Consultant, ICL/ITRI, 2002~2010  Visiting Scholar, Cisco, San Jose, 7/2007-7/2008  Director, Institute of Network Engineering, NCTU, 2005~2007  Co-Founder, L7 Networks Inc. (www.L7.com.tw), 2002 林盈達 Ying-Dar Lin
  • 3. 3 Computer Networks: An Open Source Approach considers why a protocol, designed a specific way, is more important than how a protocol works. Key concepts and underlying principles are conveyed while explaining protocol behaviors. To further bridge the long-existing gap between design and implementation, it illustrates where and how protocol designs are implemented in Linux-based systems. A comprehensive set of fifty-six live open source implementations spanning across hardware (8B/10B, OFDM, CRC32, CSMA/CD, and crypto), driver (Ethernet and PPP), kernel (longest prefix matching, checksum, NAT, TCP traffic control, socket, shaper, scheduler, firewall, and VPN), and daemon (RIP/OSPF/BGP, DNS, FTP, SMTP/POP3/IMAP4, HTTP, SNMP, SIP, streaming, and P2P) are interleaved with the text. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, Computer Networks: An Open Source Approach, McGraw-Hill, Feb 2011. www.mhhe.com/lin; available now at amazon.com Facebook Q&A Communit: www.facebook.com/CNFBs ISBN: 0-07-337624-8 / 978-007-337624-0
  • 4. 大綱 1. 監聽門的來龍去脈 20 mins 2. 電話與網路監聽的可能方式 20 mins 3. 網路通訊安全的演進歷程 20 mins 4. 最新網路駭客攻擊方式與解決技術 40 mins 5. Q&A 20 min 4
  • 5. 監聽門的來龍去脈 • 0972節費電話能否監聽? – 三個政府單位(調查局, 刑事警察局, NCC)三個答 案: no(如果不事先知道是節費電話), yes, don‘t know! – 用戶端線路與局端線路之差異 – 0972630235 vs. (02)2358-5858 • 從電信機房到監聽機房 – 符合RFC3924之監聽設備 • 裁判vs.球員: 法院/監聽機房 vs. 調查單位 5
  • 6. Centrex + PBX架構 CHT Centrex Switching 中華電信 虛擬總機 NEC PBX 立法院 交換總機 2358-XXXX 1000 1001 1002 1003 分機 E1節費專線 (0972-630231~37) • 用戶撥2358-XXXX,Centrex會將目的碼送給交換機,交換機會根據後四碼判斷 是要響鈴哪一隻分機。 • 分機撥出時,交換機會將2358(局碼)加上分機碼送出。 • 分機撥”0”時,NEC交換機會去抓E1節費專線,經由E1專線將通話送至CHT交換機, 撥出之電話雖設定為”沒有來話顯示“,但系統仍會紀錄為0972-630231~37的撥出 號碼,計價為”節費電話“之費率。 • 分機撥”*0”時,NEC交換機會去抓Centrex線,按平常的通信路由,將通話送至 CHT交換機,此時帶出的號碼會顯示Centrex的號碼,計價為“一般費率”。 6
  • 7. 0972630235 vs. (02)2358-5858 • 三種組合: – 立法院內各分機立法院外:控制訊息攜帶 0972630235 • 要監聽與側錄! – 立法院外(02)2358-5858立法院內各分機 • 無監聽與側錄 – 立法院外0972630235立法院內各分機 • 要監聽與側錄! 7
  • 8. 電話監聽方式 • 無遠端監聽系統: – 監聽單位直接拿監聽票進機房於MDF(配線架)或在測量 台上直接掛線監聽。 • 遠端監聽系統: – 所有一類電信公司(固網及手機運營商)及新的特二類業 者(節費公司)均已有供調查局或刑事警察局之遠端監聽 系統介接,但操作、管理、監聽內容儲存、處理之設 備均建置於情治單位。 – 一類電信運營商:一般由調查局負責監聽。 – 特二類(節費公司):一般由 刑事警察局負責監聽。 8
  • 9. Lawful Intercept Architecture Reference Model Law Enforcement Agency (LEA) Law Intercept Administration Function Intercept Related Information (IRI) IAP Mediation Device (MD) Content Intercept Access Point (IAP) Service Provider Functions MD Provisioning Interfaceb HI1(a) e IRI (e) HI2(g) User Content User Content c Intercept Request (d) f Intercepted Content ( f) HI3(h) d IETF RFC 3924 / ETSI ES 201671 9
  • 10. A100 0 AX CHT Centrex 虛擬總機 E1 專線 NEC PBX C7 建置於固網或手機運營商機房 建置於情治單位 10
  • 11. 監聽只有電話不含網路? • 網路也被掛線 – RFC3924也包含Data Services – 大部分應用協定都沒加密 – 常見應用協定之封包辨識沒問題 – 可以錄製或即時同步播放 – P2P應用之封包辨識與解譯之誤判與漏判較高 11
  • 12. 裁判vs.球員: 法院/監聽機房 vs. 調查單位 • 電話與網路掛線人數? – 三萬… anytime! • 若每人被掛線平均六個月, 一年應該有六萬張監聽 票!! 但實際監聽票遠低於此數! • 原因?? – 檢察官一張監聽票吃到飽 (wild card) • 加掛不相干人等 • 法院失職! – 球員兼裁判 • 球員: 檢察體系、調查局、刑事警察局 • 裁判: 法院、調查局、刑事警察局 • 調查局與刑事局辦案人員 <-> 調查局與刑事局監聽機房管理人 員 • 不能申請監聽票的情治監聽 • 機房應交給第三者管理! 12
  • 13. "非法"電話與網路監聽的可能方式 • RFC3924標準監聽機房 – 與調查局機房合作 – 直接由調查局拉線到自建機房 • 直接與電信業者或網站業者合作 – A國政府向在A國經營的B國業者索取: 看A國市場大小 – A國政府向在B國經營的A國業者索取: 最容易 – A國政府向在B國經營的C國業者索取: 美國才作得到 • 無線與有線攔截 – 電纜攔截 – 無線攔截 • IMSI Catcher: Rohde & Schwartz 2003年專利, 2012年英國法院宣告失效 • Femtocatch: femtocell • Bluejacking: Bluetooth, Wi-Fi, GPS, etc. • 後門程式 – 手動: 安裝軟體(phone spy, call interception), 拷貝SIM卡 – 自動: 惡意程式 (malware) 13
  • 14. 直接與電信業者或網站業者合作 • 被電信業者或網站出賣? – 電信業者已被RFC3924 – 用美國或日本的網站與社群較不會被出賣? • 用當地國的業者一定被出賣 • 用敵對國的業者鐵定被出賣 • 用第三國的相對較不會 – 用Skype及Line絕對安全? • 是的…. 如果它沒出賣你 – 乾脆用Bitmessage! • Decentralized P2P • 不會被出賣! 14
  • 15. 美國在各國之監聽 • 根據史諾登(Edward Snowden)給英國媒體的 資料 – 與當地政府監聽機房合作 – 與業者機房與網站合作 • 有線與無線攔截? • 後門程式? 15
  • 16. 無線攔截 IMSI Catcher • IMSI (International Mobile Subscriber Identity) • A false mobile tower – man-in-the-middle attack • Identify IMSI number and intercept through protocol hacking – solicit/associate/configure/tap – Masquerade as a base station and log IMSI numbers of nearby handsets – No authentication of base station by handset – Downgrade to GSM – Disable encryption (A5/0 mode) 16
  • 17. Defcon: Hacker shows how he can intercept cell phone calls with $1,500 device • Chris Paget at Defcon in Las Vegas, 7-31-2010 • Demo video at http://venturebeat.com/2010/07/31/hacker- shows-how-he-can-intercept-cell-phone-calls- for-1500/ 17
  • 18. Black Hat: Intercepting Calls and Cloning Phones with Femtocells • Ritter and DePerry at Black Hat in Las Vegas on 8-1-2013 • CDMA femtocell • Femtocatch: 2.5-way call 18
  • 19. 後門程式 • 安裝軟體 – StealthGenie – Wireflex – Call Interceptor – Spyera • 拷貝SIM卡 – Phone cloning – Read crypto key by SIM reader – Install spyware on the target phone • 惡意程式 – Repackaged applications – Repackaged documents 19
  • 20. StealthGenie • Spy on their Calls • Spy on their SMS Messages • Track their GPS Location • Read their Emails • Spy on their Instant Messengers • View their Multimedia Files • Monitor their Internet Activities • View their Contacts and Calendar Activities • Bug their phone • Instant Alerts and Notifications • Remotely Control their Phone 20
  • 21. 網路通訊安全的演進歷程 • 從伺服器到用戶端 • 從主動攻擊到被動傳播 • 從桌機與筆電到手機 • 從程式散播到文件搭載 21
  • 22. General Security Issues • Data security: protecting private data on the public Internet – Encryption & authentication  Virtual Private Network (VPN) • Access security: deciding who can access what – TCP/IP firewall or application firewall • System security: protecting system resources from hackers – Intrusion detection and prevention – Malware detection and prevention 22
  • 23. Vulnerability Exploiting on “Servers” • Buffer overflow attack – Put more data to the specified buffer to cause buffer overflow – Return address pointing to the cracked file to execute 23 stack pointer return address buffer (200 bytes) stack pointer cracked file address buffer (200 bytes) . . . . . . . . . . . . . . . . . . Put more data to buffer then cause buffer overflow and point to the cracked file address void called() { . . . char buffer[200]; . . . }
  • 24. Some Server Vulnerabilities 24 Vulnerabilities Application Version Reason phf Remote Command Execution Vulnerability Apache Group Apache 1.0.3 Input Validation Error Multiple Vendor BIND (NXT Oveflow) Vulnerabilities ISC BIND 8.2.1 Buffer Overflow MS IIS FrontPage 98 Extensions Buffer Overflow Vulnerability Microsoft IIS 4.0 Buffer Overflow Univ. Of imapd Buffer Overflow Vulnerability imapd 12.264 Buffer Overflow ProFTPD Remote Buffer Overflow Professional FTP proftpd 1.2pre5 Buffer Overflow Sendmail Daemon Mode Vulnerability Eric Allman Sendmail 8.8.2 Input Validation Error RedHat Piranha Virtual Server Package Default Account and Password Vulnerability RedHat Linux 6.2 Configuration Error Wu-Ftpd Remote Format String Stack Overwrite Vulnerability wu-ftpd 2.6 Input Validation Error
  • 25. Open Source Implementation 8.7: Snort 25  Three modes  Sniffer  Read and decode network packets  Packet logger  Log packets to disk  Intrusion detection system  Analyze traffic based on pre-defined rules  Perform actions based upon what it sees
  • 26. 26 Writing Snort Rules • Rule header alert tcp any any - > 10.1.1.0/24 80 • Rule option (content: “/cgi-bin/phf”; msg: “PHF probe!”;) action protocol Source address and port number destination address and port number alert messageinspective part
  • 27. Open Source Implementation 8.6: ClamAV • Introduction – open-source package for virus scanning – have detected over 570,000 malicious codes (viruses, worms and trojans, etc.) with the release of 0.95.2 version – Types of signatures • MD5 for a certain PE section (part of an executable file) • basic signatures of fixed strings (to be scanned in the entire file) • extended signatures (in a simplified form of regular expressions containing multiple parts • logical signatures (multiple signatures combined with logical operators) • logical signatures (multiple signatures combined with logical operators) 27
  • 28. Block Diagrams of ClamAV 28 cl_load cli_load cli_cvdload cli_loadmd5 cli_loadndb cli_loadldb cli_loadwdb cli_loadpdb cli_loaddb cli_parseadd cli_scanfile cli_magic_scandesc cli_scandesc cli_scanrar cli_unzip cli_unzip …… cli_ac_scanbuff cli_bm_scanbuff for signature matching for signature loading
  • 29. Performance Matters: Comparing Intrusion Detection, Antivirus, Anti-Spam, Content Filtering, and P2P Classification 29 Snort DansGuardian ClamAV SpamAssassin L7-filter Percentage of string matching 62% 86% 57% 31% 70% Inspection depth Byte jump Http request / response All attachment content Mail header/ body First 10 packets
  • 30. Distribution of Captured Malware: Active Collection vs. Passive Collection 30 Others 21% Worm 8% Trojan 59% Bot 12% Honey-Inspector Others 13% Worm 3% Trojan 5% Bot 79% Thepassivehoneypotsystem (a) The distribution of captured malware for Honey-Inspector (b) The distribution of captured malware for the passive honeypot system • Active collection and passive collection are quite disjoint.
  • 32. Distribution of Malware’s Capture Time 32 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Honey-Inspector The passive honeypot system The days that malware signature existed (Day) Percentage of captured time (%) • More zero-day malware can be collected “actively”. Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai, "How Different Are Malware Collected Actively and Passively?," IEEE Computer, to appear in 2014.
  • 33. 0 10 20 30 40 50 60 70 80 90 100 Alters Windows Firewall Checks For Debugger Copies to Windows Could Not Load Creates DLL in System Creates EXE in System Creates Hidden File Creates Mutex Creates Service Deletes File in System Deletes Original Sample Hooks Keyboard Injected Code Makes Network Connection Modifies File in System Modifies Local DNS More than 5 Processes Opens Physical Memory Starts EXE in Documents Starts EXE in Recycle Starts EXE in System Windows/Run Registry Key Set Frequency of behaviors(%) Behaviors benign programs malware Behaviors by GFI Sandbox 1 2 3 4 5 6 7 8 9 10 11 12 33 • Some permissions are potentially more malicious than the others.
  • 34. 34 Top 20 Requested Permissions by Android Malware • Again, some permissions are potentially more malicious than the others.
  • 35. Malicious Behaviors 35 Benign behaviors Suspicious behaviors Malicious network behaviors (intrusive behaviors) Malicious behaviors (non-intrusive behaviors) • Host behaviors Non-intrusive behaviors • Network behaviors Intrusive behaviors
  • 36. PC與Android行為、傳播、偵測方式比較 36 PC Android 行為  用戶端行為 資料檔案破壞、隱私竊取、 系統執行程序錯亂、佔用大 量的電腦資源  網路端行為 網路擁塞 資料破壞、隱私竊取、 金融商業行為 傳播 超連結、電子郵件附件、P2P 軟體、USB/磁片/光碟 APK檔案 偵測方 式 Behavior-based detection & Signature-based detection Signature-based detection
  • 37. APK檔案架構 37 APK檔案架構 說明 META-INF (Directory) Manifest.mf Manifest file Cert.rsa Application certification Cert.sf List of resources/SHA-1 Res (Directory) Resource used by APK(png/xml) Resources.arsc List of resource locations AndroidManifest.xml Android binary containing name, version, permissions Classes.dex Compiled source code
  • 38. 38 Trojan Rootkit Spyware Adware PuA Backdoor Geinimi  PJApps   ADRD  DroidDream   droidKungFu  SMS.FakeInst  GGTracker  J.SMSHider  DroidDreamLight  BgServ  RogueSPPush  NickySpy  Toolbar.MywebSearch  Ropin  Trojan(對使用者的資料,做惡意的行為)、Rootkit(權限的更動)、Spyware(監聽 使用者隱私)、Adware(對使用者散播無意義廣告)、PuA(對使用者的手機資源 惡意使用)、Backdoor(利用程式中的後門,在使用者執行程式時竊取資料) Android惡意程式行為及種類
  • 39. 39 APT 攻擊 vs. 傳統攻擊 APT Attacks Traditional Attacks Persistent Yes No Targeted Yes No Planned Yes No Custom exploits Yes No Hidden Yes No Motivation Collect benefit information and Exfiltration Variable
  • 40. 最新網路駭客攻擊方式與解決技術 • 最新攻擊方式 – 殭屍電腦網路(botnet) – 重新打包之應用程式(repackaged app) – 進階持續性威脅(APT, Advanced Persistent Threat) • 解決技術 – 特徵碼比對(signature matching) – 行為分析(behavior analysis) – 逆向工程(reverse engineering) 40
  • 41. 41 惡意程式偵測方法 Attributes Methods Execute File Fast/Slow Information Overhead Example tools Static Analysis No Fast General Low ClamAV Behavior Analysis Yes Slow General High ViCheck.ca Joe Sandbox Reverse Engineering Partial Slow Detailed High Xecure  Three methodologies for malware detection  Static Analysis  Behavior Analysis  Reverse Engineering
  • 42. 42 樣本收集 – 300 APT samples CVE Number File Type # Samples Product Vulnerability CVE-2010-0188 PDF 48 Acrobat Reader Adobe Reader PDF LibTiff Integer Overflow CVE-2010-2883 PDF 24 Acrobat & Acrobat Reader Adobe CoolType SING Table Stack Buffer Overflow CVE-2010-3333 RTF 52 Microsoft Office MS Office 2010 RTF Header Stack Overflow CVE-2011-2462 PDF 25 Acrobat & Acrobat Reader Adobe Reader U3D Memory Corruption CVE-2012-0158 RTF 131 Microsoft Office Stack Buffer Overflow in MSCOMCTL.OCX CVE-2013-0640 PDF 20 Acrobat & Acrobat Reader Adobe Reader Unspecified Buffer Overflow
  • 43. 43 Heap spraying After heap spraying 0 MB 100 MB 200 MB Normal heap layout 300 MB Used memory : Free memory : 0 MB 100 MB 200 MB 300 MB Used memory : Free memory : Shellcode :
  • 45. Experiment 2: 逆向工程 Classifying samples by malware region 45 Sample benign 3.3% malicious pFragments 0.6% Outside structure 19.6% 2 regions pFragments +outside structure 0.3% Datastore +Objdata 0.3% datastore+ outside structure 0.3% Themedata +outside structure 1% Themedata +Objdata 5.6% Objdata +outside structure 39.6% Objdata 7.3% Themedata 21% CVE-2012-0158
  • 46. Experiment 3: 正向工程 Embedding malware into normal RTF • After embedding: 1. malware is detected 2. context does not change 46 Malicious RTF Sample Normal RTF file Embedded malicious code RTF context context shellcode shellcode
  • 47. APT總結 • APT的特點: 客製化樣本、匿蹤 • 偵測方法: 靜態、動態、逆向工程 • 在RTF文件塞惡意程式 – 加shellcode – Where: pFragments, OBJDATA, Themedata, Datastore, Outside structures – 不同惡意程式用不同區塊 – 相同CVE的惡意程式也會用不同區塊 47
  • 48. 結論 • 電話與網路監聽氾濫 – 法規要將球員與裁判釐清 – 技術方法多元: RFC3924, 索取, 攔截, 後門 – 相關正反向產品有市場潛力 • 更高層次之資通訊安全 – 從伺服器到用戶端 – 從主動攻擊到被動傳播 – 從桌機與筆電到手機 – 從程式散播到文件搭載 • 個人自保之道? 48
  • 49. Q&A • Q1: 0972節費電話之分機不能被RFC3924監聽機房監聽。 • Q2: 電信業者不知道RFC3924監聽機房所監聽之對象為何。 • Q3: 加密過的行動電話之通話無法被無線攔截監聽。 • Q4: 通訊網路設備在通過安全檢測之後仍可經過韌體更新將後門程式 植入。 • Q5: 近年來的網路攻擊模式中主動的比率較被動高。 • Q6: 防毒軟體常常抓不到APT是因為: (1)沒有取得病毒樣本、(2)病毒會 變形以至於病毒碼比對不到、(3)沒有去動態執行文件檔中的macro程 式、(4)以上都可能。 • Q7: Honeypot收集惡意程式的特性: (1)主動收集主動傳播、(2)主動收 集被動傳播、(3)被動收集主動傳播、(4)被動收集被動傳播。 • Q8: 手機病毒目前最常見的傳播方式為: (1)主動傳播之程式、(2)主動 傳播之文件、(3)被動傳播之程式、(4)被動傳播之文件。 • Q9: 特徵碼比對、行為分析與逆向工程三者中何者有執行病毒程式: (1) 特徵碼比對、(2)行為分析、(3)逆向工程、(4)行為分析與逆向工程、(5) 特徵碼比對與行為分析、(6)特徵碼比對與逆向工程。 • Q10: 哪些資通訊產品使用習慣是高度危險的 (複選): (1)手機之 Bluetooth的default設定是打開、(2)手機借朋友、(3)別人可以看到你 Facebook的好友有哪些、(4)使用Line或Skype通訊、(5)使用WeChat通 訊、(6)在P2P網路尋找程式、音樂與遊戲。 49