Study Notes for Computer Security and Ethical Hacking
Computer Security and Ethical Hacking (CST 3535 W3)
Overview
Lecturer: Dr. Shahedur Rahman
Faculty: Science and Technology
Learning Objectives
Understand malware threats
Comprehend the basic operations of viruses, worms, and Trojans
Explore methods of malware propagation
Identify categories of malware payloads
Discuss propagation mechanisms utilized by viruses, worms, and Trojans
Understand countermeasure mechanisms against malware
Malware
Definition: Malware refers to programs planted by an agent with malicious intent, aimed at causing unanticipated or undesired effects.
Types of Malware
Virus
A program that can replicate itself and spread malicious code to other nonmalicious programs by modifying them.
Worm
A standalone program that spreads copies of itself across networks.
Trojan Horse
Code that, while performing its intended function, also has a hidden malicious effect.
Harm from Malicious Code
Harm to Users and Systems:
Sending unsolicited emails to user contacts.
Deleting or encrypting files.
Modifying system information (e.g., Windows registry).
Stealing sensitive information (e.g., passwords).
Attaching malware to critical system files.
Hiding copies of malware in multiple locations.
Harm to the World:
Some malware has been known to infect millions of systems, spreading at a geometric rate.
Infected systems can serve as staging areas for leveraging new infections.
Transmission and Propagation
Propagation Methods:
Setup and installer programs.
Attachments in emails or documents.
Autorun features in devices and media.
Infection via nonmalicious programs (e.g., appended, surrounded, integrated viruses).
Virus Overview
Definition: A piece of software that infects programs, modifies them to include a copy of the virus, replicates, and spreads to other content.
Characteristics:
Easily spreads in network environments.
Executes secretly when the host program is run.
Specific to particular operating systems and hardware, exploiting vulnerabilities.
Virus Classifications
Classification by Target:
Boot Sector Infector: Infects master boot records and spreads when the system boots the infected disk.
File Infector: Infects files that are executable according to the operating system.
Macro Virus: Infects documents with macro or scripting code.
Multipartite Virus: Infects files in multiple ways.
Stealth Virus: Designed to evade detection by antivirus software.
Polymorphic Virus: Mutates with each infection.
Metamorphic Virus: Completely rewrites itself during each iteration.
Virus Components:
Infection Vector: The means by which a virus spreads.
Trigger: An event or condition that activates the payload.
Payload: The damaging activity executed by the virus upon activation.
Macro and Scripting Viruses
NISTIR 7298 Definition: A macro virus attaches itself to documents, utilizing the macro programming capabilities of the application to execute and propagate.
Threat Factors:
Platform independence.
Infection of user documents rather than executable codes.
High ease of modification compared to traditional viruses.
Worms
Definition: Malware that actively seeks additional machines to infect, with each infected machine acting as a launchpad for further spread.
Propagation Mechanisms:
Exploits vulnerabilities in client/server software.
Utilizes network connections.
Spreads through shared media (USB drives, CDs, DVDs).
E-mail-based propagation via macro or script attachments.
Historical Example:
The Morris Worm (1988) was one of the earliest significant worm infections affecting UNIX systems, exploiting various vulnerabilities.
Case Study: WannaCry Ransomware Attack
Incident: In May 2017, WannaCry quickly infected hundreds of thousands of systems worldwide—targeting unpatched Windows systems by exploiting the SMB file-sharing service.
Mechanism: Aggressive scanning of local and remote networks; momentarily halted by a “kill-switch” domain activation by a security researcher.
Consequences: Encrypted files with a ransom demand in Bitcoin.
Additional Malware Types
Drive-by Downloads
Infect systems by exploiting browser and plugin vulnerabilities through malicious web pages.
Watering-Hole Attacks
Involve compromising websites frequented by targeted victims to exploit vulnerabilities.
Malvertising
Places malware within ads on websites, enabling infection of visitors without site compromise.
Clickjacking
Also known as User Interface (UI) Redress Attack, it tricks users into performing unintended actions.
Mechanism: Multiple layers to reroute clicks away from intended targets.
Social Engineering
Definition: The psychological manipulation of people to perform actions or divulge confidential information.
Spam is often a carrier for phishing attacks.
Payload Types
Ransomware
Threatens users by encrypting files and demanding ransom.
System Corruption Examples
Chernobyl Virus: Rewrites BIOS code.
Stuxnet Worm: Targets industrial control systems.
Attack Agents
Bots: Take over other computers, acting collectively as a botnet for attacks or information theft.
Information Theft Techniques
Keyloggers: Capture keystrokes to monitor information like passwords.
Spyware: Monitors a range of activities, altering browsing content or redirecting requests.
Phishing Attacks: Exploit users' trust to capture sensitive information through fake websites.
Spear-Phishing: Tailored attacks based on detailed information about the target.
Stealthing Mechanisms
Backdoor/Trapdoor: Provides secret system access, bypassing security.
Maintenance hooks are examples used for debugging.
Rootkits: Install a hidden set of programs maintaining covert access while subverting detection mechanisms.
Rootkit Classifications
Characteristics include: Persistent, Memory-based, User mode, Kernel mode, Virtual machine-based, External mode.
Summary
Review the various types of malicious software (malware).
Understand propagation vulnerabilities and stealth techniques used.
Familiarize with attack agents and information theft methodologies.
Engage with countermeasure techniques for protecting against malware attacks.
References
Stallings, William, and Brown, Lawrie. Fourth Edition.
Pfleeger, Charles P. Fifth Edition.