180 likes | 342 Views
The Lifecycle of a Worm. Bill Stearns and Bob Gray, Senior Research Engineers Institute for Security Technology Studies, Investigative Research for Infrastructure Assurance Dartmouth College. Request a web page GET /TECH/ HTTP/1.0. 2. Receive the web page <HTML><HEAD><TITLE>Sci-Tech ….
E N D
The Lifecycle of a Worm Bill Stearns and Bob Gray, Senior Research Engineers Institute for Security Technology Studies, Investigative Research for Infrastructure Assurance Dartmouth College FAIR
Request a web page • GET /TECH/ HTTP/1.0 2.Receive the web page <HTML><HEAD><TITLE>Sci-Tech … www.cnn.com(server) Client-Server Applications Your Machine (client) FAIR
Web Server GET /TECH/ HTTP/1.0 E C Request Buffer Rest of Program Buffer Overflows G E T T / • The programmer • Made the buffer too short, and … • Did not check the length of the request FAIR
Insecure Programs • Redhat Linux 6.2 and 7.0 • 2 File sharing tools • 1 Print server • Exploitable programs but fixes available. FAIR
The Cracker • Electronic graffiti artist to destructive criminal • Motivations • Fame, notoriety, money, revenge • Generally independent FAIR
Hacker’s Machine Send the buffer overflow … R … and take control of the machine sleepy.dartmouth.edu (target) The Ramen Worm (I) Step 1: Infect the first machine • Break in using buffer overflows • Close holes behind itself • Stops reinfection • Morris worm tried, but failed • Modify the system • Email the cracker FAIR
Vulnerable Vulnerable R R sneezy grumpy Vulnerable Vulnerable The Ramen Worm (II) sleepy.dartmouth.edu R Step 2: Automatically infect more machines • Scan for vulnerable machines • Infect vulnerable machines • Keep on going bashful dopey FAIR
The System Administrator • The individual responsible for maintaining computers • Applies system upgrades FAIR
Problem Reports • Sans GIAC • Spanish CERT FAIR
The Analysts • ISTS staff, Volunteers, SANS and Cert • Max Vision, Dave Dittrich, Bill Stearns, Chris Brenton FAIR
Analysis • Max Vision, Dave Dittrich, Bill Stearns • Analyze sensor information • Inspect files included in the worm • Determine their goals, actions, effects FAIR
Ramenfind • Detects the worm • Stops the running programs • Removes the files from the system • Keeps a copy for later analysis FAIR
Distribution • Sans, ISTS web site • Security Mailing lists • Packetstorm • News agencies and mailing lists FAIR
Cracker develops a new, more elusive attack. Cracker Analyst Analyst develops an improved detection tool. Arms Race FAIR
ISTS Response Team Looks like Ramen … State Police Computer Lab Training and Support • Training • Network Forensics (May 2001) • Advanced Forensic Tools (June 2001) • Support • Advanced Law Enforcement Response Team (ALERT) FAIR
System Administrator Investigator Information Delivery Repository FAIR
Tool Development • RamenFind • Finds and removes the Ramen worm • LionFind • Finds and removes the Lion worm • ShareFind • Finds file-sharing programs, such as Napster and Gnutella, that have been installed on Windows machines. FAIR
Example: Internet Health Monitor Long Term Research Failing Link FAIR