Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

28
Crouching Admin, Hidden Hacker Paula Januszkiewicz CQURE: CEO, Penetration Tester iDesign: Security Architect

description

More info on http://techdays.be.

Transcript of Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Page 1: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Crouching Admin, Hidden Hacker

Paula JanuszkiewiczCQURE: CEO, Penetration Tester

iDesign: Security Architect

Page 2: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Paula Januszkiewicz

CQURE: CEO, Penetration Tester

iDesign: Security Architect

[email protected] | [email protected]

http://idesign.net

Contact

Page 3: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Session Goals

Be familiar with the possibilies of the operating system

Page 4: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Agenda

Page 5: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Operating System Accountability

Page 6: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Agenda

Page 7: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Operating System Logging

Mechanisms

http://www.clearci.com

Page 8: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Logs Less & More

Advanced

Page 9: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Hacker’s Delivery

Page 10: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Services & ACLs

demo

Page 11: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Replacing Files

Page 12: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

"Vulnerabilities"

demo

Page 13: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Launching Evil Code

Page 14: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

http://stderr.pl/cqure/stuxnet.zip

Page 15: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Services (In)Security

Page 16: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

From A to Z - DLLs

Page 17: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Kernel Traces

Page 18: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Areas of Focus

Page 19: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Agenda

Page 20: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Dirty Games: Hiding Mechanisms

Page 21: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Hidden Processes

Page 22: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Dirty Games: Protection Mechanisms

Page 23: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Protected Processes

Page 24: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Dirty Games: Hooks

Page 25: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Hooking

Page 26: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

3 of 10 Immutable Laws of Security

Page 27: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Agenda

Page 28: Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Summary