SlideShare a Scribd company logo
Managed IT Solutions
Keep IT Clean
Kyle Bisdorf
Managed IT Solutions
Managed IT Solutions
W.W.W.W.W.
– Kyle Bisdorf
– TTL/ Lead Security Analyst
– 24 y.o.
– Indy for ~7 years
Computer Security (Forensics/Incident Response), Breaking stuff,
Building servers & testing apps
Managed IT Solutions
Malware, eh?
Managed IT Solutions
Malware, eh?
• Malware is any code/application that can be used with
malicious intent
– Rootkits
– Worms
– Trojans
– Spyware/Adware
– Fork Bomb(DoS)
• This presentation will focus on Windows based malware
– Yes, Mac OS X, Android, iPhone, can be infected
Managed IT Solutions
Malware, eh?
• Who has seen an infected computer?
• What did you do to fix it?
Managed IT Solutions
Trust & Responsibility
– Use at your own risk
• I have used all of the tools we will be discussing, but I do not
guarantee their security. They are constantly developed, often by
anonymous contributors. I don’t have time to do a code review of
all the tools I use.
– Respect the privacy of others
– Get permission, it is not implied
Managed IT Solutions
Managed IT Solutions
How did this happen?!
Managed IT Solutions
How did this happen?
• The web is littered with bad code
– Compromised web site
• Cross-site Scripting (XSS)
• Modified source code of a site
– Piggybacking on other applications
• PDFs, torrent downloads, email attachment
Managed IT Solutions
What can you do?
Managed IT Solutions
What can you do?
• Containment
• Eradication
• Recovery
• Lessons
Managed IT Solutions
Cease and Desist!
[containment]
Managed IT Solutions
Tricky!
• Some malware is “self-aware”
– If it sees well-known processes running, it
may behave differently
• Programmers are lazy, they may only look
for file names
– Try renaming your executable before
running it!
• Traverses the network too
Managed IT Solutions
What to do…
• Isolation is your friend
– USB, Network (wireless / wired)
• Pray you have backups!
– * There are clever ways to get data back
• Linux LiveCD or Hard Drive Case
• Fight back!
Managed IT Solutions
NFHO!
[eradicate]
Managed IT Solutions
Sysinternals (and cmd)
• Toolset made by Mark Russinovich (and many other co-
authors)
– TCPView
– ProcessMonitor
– Autoruns
– Netstat -naob
Managed IT Solutions
Sysinternals (and cmd)
• ProcMon
– RegSetValue, RegCreateKey, RegDeleteKey
– CreateFile, WriteFile
– Process Create, Process Start
Managed IT Solutions
Sysinternals
• AutoRuns
Managed IT Solutions
Useful commands
• doskey /history
• wmic process list brief
• wmic startup list full
• ipconfig /displaydns | find /i "record name“
• tasklist /svc | sort
• echo startup | WMIC
Managed IT Solutions
FCIV
• File Checksum Integrity Verifier
Managed IT Solutions
Automated Cleanup
• MalwareBytes
• F-Secure Rescue CD
• *many others
Managed IT Solutions
Worst Case…
• Restore from backup
• Reinstall from original media
Managed IT Solutions
Going Forward
Managed IT Solutions
Be careful
• The internet is a dangerous place
– Browser extensions
• Hover technique
• Virtual Sandbox
Managed IT Solutions
Toolbox
Keyword Description Reference
Virus Total Google’s Hash Checker https://www.virustotal.com/
MalwareBytes Post-infection, malware removal https://www.malwarebytes.org/
Sysinternals
Peel back behind the GUI to find what
Windows is doing
http://technet.microsoft.com/en-
us/sysinternals/bb842062.aspx
Team Cymru Hash Lookup TC Hash Checker https://hash.cymru.com/
VirtualBox
Hypervisor, for running virtual
machines
https://www.virtualbox.org/
MalwareViz
Upload hashes or links to malwr.com
to visualize malware
https://www.malwareviz.com/
F-Secure Rescue CD
LiveCD to automatically scan your
computer
https://www.f-
secure.com/en/web/labs_global/rescu
e-cd
Managed IT Solutions
Toolbox, cont’d
Keyword Description Reference
Process Hacker http://processhacker.sourceforge.net/
Wireshark
Network sniffing. You can see where
the malware is going!
https://www.wireshark.org/download.h
tml
Microsoft FCIV
Useful for creating file hashes, or
verifying known files
http://www.microsoft.com/en-
us/download/details.aspx?id=11533
7z
Zip up malware with password
protection
http://www.7-zip.org/
Extension: Ad Block Plus
Extension: Ghostery
Extension: NoScript
Extension: PrivacyBadger
Managed IT Solutions

More Related Content

What's hot

CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
Sam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
Sam Bowne
 
Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017
Peter Rawsthorne
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
Sam Bowne
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
Threats
ThreatsThreats
Threats
sbmiller87
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
Precisely
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
woyaoni
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
gocybersec
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
Sam Bowne
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
Precisely
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Sam Bowne
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
gocybersec
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
Sam Bowne
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Sam Bowne
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
aissa benyahya
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture D
CMDLearning
 

What's hot (20)

CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017Security and Software Engineering BSides St. John's 2017
Security and Software Engineering BSides St. John's 2017
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
Threats
ThreatsThreats
Threats
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
 
Ch8ed12romney
Ch8ed12romneyCh8ed12romney
Ch8ed12romney
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture D
 

Similar to Apparatus finding bad(malware)

Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
Invincea, Inc.
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
ESET
 
Computer Security
Computer SecurityComputer Security
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
warezjoe
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
Mona Arkhipova
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
Raja Waseem Akhtar
 
Ch11
Ch11Ch11
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
Invincea, Inc.
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
Ravi Sankar
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
MNCERT
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
Charles Lim
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
n|u - The Open Security Community
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
Claus Cramon Houmann
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
FRSecure
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
Claus Cramon Houmann
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
ajajkhan16
 
L27
L27L27
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.ppt
PawachMetharattanara
 

Similar to Apparatus finding bad(malware) (20)

Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Advanced Persistent Threats
Advanced Persistent ThreatsAdvanced Persistent Threats
Advanced Persistent Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
Enterprise Forensics 101
Enterprise Forensics 101Enterprise Forensics 101
Enterprise Forensics 101
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Ch11
Ch11Ch11
Ch11
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
 
L27
L27L27
L27
 
basicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.pptbasicitknowledge-101119022655-phpapp02.ppt
basicitknowledge-101119022655-phpapp02.ppt
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 

Recently uploaded (19)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 

Apparatus finding bad(malware)

  • 1. Managed IT Solutions Keep IT Clean Kyle Bisdorf
  • 3. Managed IT Solutions W.W.W.W.W. – Kyle Bisdorf – TTL/ Lead Security Analyst – 24 y.o. – Indy for ~7 years Computer Security (Forensics/Incident Response), Breaking stuff, Building servers & testing apps
  • 5. Managed IT Solutions Malware, eh? • Malware is any code/application that can be used with malicious intent – Rootkits – Worms – Trojans – Spyware/Adware – Fork Bomb(DoS) • This presentation will focus on Windows based malware – Yes, Mac OS X, Android, iPhone, can be infected
  • 6. Managed IT Solutions Malware, eh? • Who has seen an infected computer? • What did you do to fix it?
  • 7. Managed IT Solutions Trust & Responsibility – Use at your own risk • I have used all of the tools we will be discussing, but I do not guarantee their security. They are constantly developed, often by anonymous contributors. I don’t have time to do a code review of all the tools I use. – Respect the privacy of others – Get permission, it is not implied
  • 9. Managed IT Solutions How did this happen?!
  • 10. Managed IT Solutions How did this happen? • The web is littered with bad code – Compromised web site • Cross-site Scripting (XSS) • Modified source code of a site – Piggybacking on other applications • PDFs, torrent downloads, email attachment
  • 12. Managed IT Solutions What can you do? • Containment • Eradication • Recovery • Lessons
  • 13. Managed IT Solutions Cease and Desist! [containment]
  • 14. Managed IT Solutions Tricky! • Some malware is “self-aware” – If it sees well-known processes running, it may behave differently • Programmers are lazy, they may only look for file names – Try renaming your executable before running it! • Traverses the network too
  • 15. Managed IT Solutions What to do… • Isolation is your friend – USB, Network (wireless / wired) • Pray you have backups! – * There are clever ways to get data back • Linux LiveCD or Hard Drive Case • Fight back!
  • 17. Managed IT Solutions Sysinternals (and cmd) • Toolset made by Mark Russinovich (and many other co- authors) – TCPView – ProcessMonitor – Autoruns – Netstat -naob
  • 18. Managed IT Solutions Sysinternals (and cmd) • ProcMon – RegSetValue, RegCreateKey, RegDeleteKey – CreateFile, WriteFile – Process Create, Process Start
  • 20. Managed IT Solutions Useful commands • doskey /history • wmic process list brief • wmic startup list full • ipconfig /displaydns | find /i "record name“ • tasklist /svc | sort • echo startup | WMIC
  • 21. Managed IT Solutions FCIV • File Checksum Integrity Verifier
  • 22. Managed IT Solutions Automated Cleanup • MalwareBytes • F-Secure Rescue CD • *many others
  • 23. Managed IT Solutions Worst Case… • Restore from backup • Reinstall from original media
  • 25. Managed IT Solutions Be careful • The internet is a dangerous place – Browser extensions • Hover technique • Virtual Sandbox
  • 26. Managed IT Solutions Toolbox Keyword Description Reference Virus Total Google’s Hash Checker https://www.virustotal.com/ MalwareBytes Post-infection, malware removal https://www.malwarebytes.org/ Sysinternals Peel back behind the GUI to find what Windows is doing http://technet.microsoft.com/en- us/sysinternals/bb842062.aspx Team Cymru Hash Lookup TC Hash Checker https://hash.cymru.com/ VirtualBox Hypervisor, for running virtual machines https://www.virtualbox.org/ MalwareViz Upload hashes or links to malwr.com to visualize malware https://www.malwareviz.com/ F-Secure Rescue CD LiveCD to automatically scan your computer https://www.f- secure.com/en/web/labs_global/rescu e-cd
  • 27. Managed IT Solutions Toolbox, cont’d Keyword Description Reference Process Hacker http://processhacker.sourceforge.net/ Wireshark Network sniffing. You can see where the malware is going! https://www.wireshark.org/download.h tml Microsoft FCIV Useful for creating file hashes, or verifying known files http://www.microsoft.com/en- us/download/details.aspx?id=11533 7z Zip up malware with password protection http://www.7-zip.org/ Extension: Ad Block Plus Extension: Ghostery Extension: NoScript Extension: PrivacyBadger

Editor's Notes

  1. Eradication phase about removing files you have identified as being malicious.
  2. These tools can help you identify what files are doing bad things May need to boot into a linux liveCD to remove Sysinternals is REALLY REALLY useful for learning the ins/outs of Windows
  3. These tools can help you identify what files are doing bad things May need to boot into a linux liveCD to remove ProcMon is a GUI application that actively shows processes on your machine, and associated files/network activity Helpful for post-infection If you find a suspect file, you can FCIV it and submit your hash
  4. These tools can help you identify what files are doing bad things May need to boot into a linux liveCD to remove Windows has manymanymany load points A load point is a directory/location on your operating system that is called upon regularly Helps malware maintain persistence
  5. These tools can help you identify what files are doing bad things May need to boot into a linux liveCD to remove Windows has manymanymany load points A load point is a directory/location on your operating system that is called upon regularly Helps malware maintain persistence
  6. These tools can help you identify what files are doing bad things May need to boot into a linux liveCD to remove If you find a file you think is malware, obtain an MD5 hash