SlideShare a Scribd company logo
1 of 22
Using Windows to Defend Windows Scott Wilson Levi Arnold Oklahoma State University
Malware – first steps in fighting Recognize that something's wrong Learn to run a scan/removal tool, like SpyBot, SpywareDoctor, MBAM or another. Very excited, willing to suggest a scan as a solution to every problem they see.
Malware – next steps in fighting Learn about layered defenses and the difference between antivirus and anti-spyware scanners. Learn how to better use scanners and removal tools; know when MBAM will work better than SpyBot, know what false positives are likely to be thrown by scanners.
Begin to get past scanning Learn some more in-depth software tools, like the Sysinternals Utilities. Begin to get an idea how malware works.
Going past scanning Dealing with a 4-H agent’s computer Ran SpyBot and some other scanners, but the machine kept re-infecting itself after rebooting.
Recovery Console In-law’s computer Vundo and TDSS, hybridized Vundofix didn’t work, neither did Avenger, neither did Combofix, neither did …
Recovery Console RC command “disable” allows disabling services/device drivers disable {[service_name]|[device_driver_ name]} RC also allows viewing of hidden files Other boot disks can give similar options, although they can be difficult to configure.
Hosts files County employee who loved StarWare, even though it was making her machine crash constantly.
Hosts files Ad-blocking host files from Mike Skallas (www.everythingisnt.com) and MVPS (www.mvps.org)also block many malware sites.
Hosts files Host files can also be used positively, to provide a constant reference for a machine.
Executable redirecting Open regedit Browse to HKLMoftwareicrosoftindows NTurrentVersionmage File Execution Options Create a new key with the name of the process you want to block; e.g., calc.exe
Executable redirecting Create a new string value under that key. Name it Debugger. Modify the value data to be:  Rundll32.Exe url.Dll,FileProtocolHandler http://www.google.com/search?q=
Executable redirecting [HKEY_LOCAL_MACHINEOFTWAREicrosoftindows NTurrentVersionmage File Execution Optionsalc.exe] "Debugger"="Rundll32.Exe url.Dll,FileProtocolHandler http://www.google.com/search?q="
Executable redirecting Perhaps that wasn’t a good example.
Executable redirecting [HKEY_LOCAL_MACHINEOFTWAREicrosoftindows NTurrentVersionmage File Execution OptionsntiSpyware2008.exe] "Debugger"="cmd.exe /c echo  %time% %date% >> c:ExecBlocked.log"
Executable redirecting It’s possible to call any type of executable file from the redirect, so using a batch file to script multiple actions upon malware executing is possible.
Executable redirecting Up side: possible to immunize the system against annoying things like AV2008. Possible to script events to happen to alert your IT staff when a computer gets infected.
Executable redirecting Down side: have to know the name of the executable or process. It’s not practical to immunize against those malware objects that generate a random name – although you can stop them executing while working on a system.
Going forward Learn about malware. Learn how it works, how it spreads, what the different types do. Learn some programming; it will help you to have some idea of how malware works.
Learning Resources - Blogs Mark Russinovich: http://blogs.technet.com/markrussinovich TrendMicro: http://blog.trendmicro.com/  F-Secure:                                http://www.f-secure.com/weblog/ Viruslist: http://www.viruslist.com/en/weblog Microsoft: http://blogs.technet.com/mmpc/
Learning Resources - Fora Geek University : Forum-based training for malware fighters. http://www.geekstogo.com/forum/index.php?autocom=custom&page=GeekU Bleeping Computer: Has both removal guides and excellent fora. http://www.bleepingcomputer.com/ PC Hell: similar to Bleeping Computer. http://www.pchell.com/
Learning Resources - Other Email lists. Vince Verbeke has a good one – send him an email to subscribe. Books: Malware: Fighting Malicious Code by Ed Skoudis; Hacking Exposed: Malware and Rootkits by Davis, Bodmerand Lord (September 16th)

More Related Content

Viewers also liked

CRITERION 7-1.docx - Minnesota State Colleges and Universities
CRITERION 7-1.docx - Minnesota State Colleges and UniversitiesCRITERION 7-1.docx - Minnesota State Colleges and Universities
CRITERION 7-1.docx - Minnesota State Colleges and Universitiesbutest
 
附件下载 - 广州市第八十三中学
附件下载 - 广州市第八十三中学附件下载 - 广州市第八十三中学
附件下载 - 广州市第八十三中学butest
 
IIS 7.0 for Apache Administrators
IIS 7.0 for Apache AdministratorsIIS 7.0 for Apache Administrators
IIS 7.0 for Apache Administratorsbutest
 
Trabajo De Binarios Y Conversion
Trabajo De Binarios Y ConversionTrabajo De Binarios Y Conversion
Trabajo De Binarios Y Conversionguesta678d8
 
Dowload Paper.doc.doc
Dowload Paper.doc.docDowload Paper.doc.doc
Dowload Paper.doc.docbutest
 

Viewers also liked (8)

[PDF]
[PDF][PDF]
[PDF]
 
CRITERION 7-1.docx - Minnesota State Colleges and Universities
CRITERION 7-1.docx - Minnesota State Colleges and UniversitiesCRITERION 7-1.docx - Minnesota State Colleges and Universities
CRITERION 7-1.docx - Minnesota State Colleges and Universities
 
附件下载 - 广州市第八十三中学
附件下载 - 广州市第八十三中学附件下载 - 广州市第八十三中学
附件下载 - 广州市第八十三中学
 
.doc
.doc.doc
.doc
 
IIS 7.0 for Apache Administrators
IIS 7.0 for Apache AdministratorsIIS 7.0 for Apache Administrators
IIS 7.0 for Apache Administrators
 
Trabajo De Binarios Y Conversion
Trabajo De Binarios Y ConversionTrabajo De Binarios Y Conversion
Trabajo De Binarios Y Conversion
 
Dowload Paper.doc.doc
Dowload Paper.doc.docDowload Paper.doc.doc
Dowload Paper.doc.doc
 
CEO Certificate_Q2_2016
CEO Certificate_Q2_2016CEO Certificate_Q2_2016
CEO Certificate_Q2_2016
 

Similar to Slide 1 - Oklahoma State University - Welcome

CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptManjuAppukuttan2
 
Continuous Integration using Cruise Control
Continuous Integration using Cruise ControlContinuous Integration using Cruise Control
Continuous Integration using Cruise Controlelliando dias
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics toolsVishnuPratap7
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administrationConcentrated Technology
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryonePaul Melson
 
Ilomo Clampi Botnet Aug2009
Ilomo Clampi Botnet Aug2009Ilomo Clampi Botnet Aug2009
Ilomo Clampi Botnet Aug2009Trend Micro
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysissecurityxploded
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 
Reversing & malware analysis training part 12 rootkit analysis
Reversing & malware analysis training part 12   rootkit analysisReversing & malware analysis training part 12   rootkit analysis
Reversing & malware analysis training part 12 rootkit analysisAbdulrahman Bassam
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston HeckerEC-Council
 
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)Akmal Hisyam
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av softwareJoxean Koret
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av softwareThomas Pollet
 

Similar to Slide 1 - Oklahoma State University - Welcome (20)

CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
 
Best free tools for w d a
Best free tools for w d aBest free tools for w d a
Best free tools for w d a
 
Best free tools for win database admin
Best free tools for win database adminBest free tools for win database admin
Best free tools for win database admin
 
App locker
App lockerApp locker
App locker
 
Continuous Integration using Cruise Control
Continuous Integration using Cruise ControlContinuous Integration using Cruise Control
Continuous Integration using Cruise Control
 
PC Maintenance
PC MaintenancePC Maintenance
PC Maintenance
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics tools
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
 
Ilomo Clampi Botnet Aug2009
Ilomo Clampi Botnet Aug2009Ilomo Clampi Botnet Aug2009
Ilomo Clampi Botnet Aug2009
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 
Reversing & malware analysis training part 12 rootkit analysis
Reversing & malware analysis training part 12   rootkit analysisReversing & malware analysis training part 12   rootkit analysis
Reversing & malware analysis training part 12 rootkit analysis
 
Security by Weston Hecker
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
 
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
 

More from butest

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEbutest
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jacksonbutest
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALbutest
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer IIbutest
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.docbutest
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1butest
 
Facebook
Facebook Facebook
Facebook butest
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...butest
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTbutest
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docbutest
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docbutest
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.docbutest
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!butest
 

More from butest (20)

EL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBEEL MODELO DE NEGOCIO DE YOUTUBE
EL MODELO DE NEGOCIO DE YOUTUBE
 
1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同1. MPEG I.B.P frame之不同
1. MPEG I.B.P frame之不同
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Timeline: The Life of Michael Jackson
Timeline: The Life of Michael JacksonTimeline: The Life of Michael Jackson
Timeline: The Life of Michael Jackson
 
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...
 
LESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIALLESSONS FROM THE MICHAEL JACKSON TRIAL
LESSONS FROM THE MICHAEL JACKSON TRIAL
 
Com 380, Summer II
Com 380, Summer IICom 380, Summer II
Com 380, Summer II
 
PPT
PPTPPT
PPT
 
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet JazzThe MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazz
 
MICHAEL JACKSON.doc
MICHAEL JACKSON.docMICHAEL JACKSON.doc
MICHAEL JACKSON.doc
 
Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1Social Networks: Twitter Facebook SL - Slide 1
Social Networks: Twitter Facebook SL - Slide 1
 
Facebook
Facebook Facebook
Facebook
 
Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...Executive Summary Hare Chevrolet is a General Motors dealership ...
Executive Summary Hare Chevrolet is a General Motors dealership ...
 
Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...Welcome to the Dougherty County Public Library's Facebook and ...
Welcome to the Dougherty County Public Library's Facebook and ...
 
NEWS ANNOUNCEMENT
NEWS ANNOUNCEMENTNEWS ANNOUNCEMENT
NEWS ANNOUNCEMENT
 
C-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.docC-2100 Ultra Zoom.doc
C-2100 Ultra Zoom.doc
 
MAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.docMAC Printing on ITS Printers.doc.doc
MAC Printing on ITS Printers.doc.doc
 
Mac OS X Guide.doc
Mac OS X Guide.docMac OS X Guide.doc
Mac OS X Guide.doc
 
hier
hierhier
hier
 
WEB DESIGN!
WEB DESIGN!WEB DESIGN!
WEB DESIGN!
 

Slide 1 - Oklahoma State University - Welcome

  • 1. Using Windows to Defend Windows Scott Wilson Levi Arnold Oklahoma State University
  • 2. Malware – first steps in fighting Recognize that something's wrong Learn to run a scan/removal tool, like SpyBot, SpywareDoctor, MBAM or another. Very excited, willing to suggest a scan as a solution to every problem they see.
  • 3. Malware – next steps in fighting Learn about layered defenses and the difference between antivirus and anti-spyware scanners. Learn how to better use scanners and removal tools; know when MBAM will work better than SpyBot, know what false positives are likely to be thrown by scanners.
  • 4. Begin to get past scanning Learn some more in-depth software tools, like the Sysinternals Utilities. Begin to get an idea how malware works.
  • 5. Going past scanning Dealing with a 4-H agent’s computer Ran SpyBot and some other scanners, but the machine kept re-infecting itself after rebooting.
  • 6. Recovery Console In-law’s computer Vundo and TDSS, hybridized Vundofix didn’t work, neither did Avenger, neither did Combofix, neither did …
  • 7. Recovery Console RC command “disable” allows disabling services/device drivers disable {[service_name]|[device_driver_ name]} RC also allows viewing of hidden files Other boot disks can give similar options, although they can be difficult to configure.
  • 8. Hosts files County employee who loved StarWare, even though it was making her machine crash constantly.
  • 9. Hosts files Ad-blocking host files from Mike Skallas (www.everythingisnt.com) and MVPS (www.mvps.org)also block many malware sites.
  • 10. Hosts files Host files can also be used positively, to provide a constant reference for a machine.
  • 11. Executable redirecting Open regedit Browse to HKLMoftwareicrosoftindows NTurrentVersionmage File Execution Options Create a new key with the name of the process you want to block; e.g., calc.exe
  • 12. Executable redirecting Create a new string value under that key. Name it Debugger. Modify the value data to be: Rundll32.Exe url.Dll,FileProtocolHandler http://www.google.com/search?q=
  • 13. Executable redirecting [HKEY_LOCAL_MACHINEOFTWAREicrosoftindows NTurrentVersionmage File Execution Optionsalc.exe] "Debugger"="Rundll32.Exe url.Dll,FileProtocolHandler http://www.google.com/search?q="
  • 14. Executable redirecting Perhaps that wasn’t a good example.
  • 15. Executable redirecting [HKEY_LOCAL_MACHINEOFTWAREicrosoftindows NTurrentVersionmage File Execution OptionsntiSpyware2008.exe] "Debugger"="cmd.exe /c echo %time% %date% >> c:ExecBlocked.log"
  • 16. Executable redirecting It’s possible to call any type of executable file from the redirect, so using a batch file to script multiple actions upon malware executing is possible.
  • 17. Executable redirecting Up side: possible to immunize the system against annoying things like AV2008. Possible to script events to happen to alert your IT staff when a computer gets infected.
  • 18. Executable redirecting Down side: have to know the name of the executable or process. It’s not practical to immunize against those malware objects that generate a random name – although you can stop them executing while working on a system.
  • 19. Going forward Learn about malware. Learn how it works, how it spreads, what the different types do. Learn some programming; it will help you to have some idea of how malware works.
  • 20. Learning Resources - Blogs Mark Russinovich: http://blogs.technet.com/markrussinovich TrendMicro: http://blog.trendmicro.com/ F-Secure: http://www.f-secure.com/weblog/ Viruslist: http://www.viruslist.com/en/weblog Microsoft: http://blogs.technet.com/mmpc/
  • 21. Learning Resources - Fora Geek University : Forum-based training for malware fighters. http://www.geekstogo.com/forum/index.php?autocom=custom&page=GeekU Bleeping Computer: Has both removal guides and excellent fora. http://www.bleepingcomputer.com/ PC Hell: similar to Bleeping Computer. http://www.pchell.com/
  • 22. Learning Resources - Other Email lists. Vince Verbeke has a good one – send him an email to subscribe. Books: Malware: Fighting Malicious Code by Ed Skoudis; Hacking Exposed: Malware and Rootkits by Davis, Bodmerand Lord (September 16th)