电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

内存取证检测恶意木马

27页
  • 卖家[上传人]:第***
  • 文档编号:90668878
  • 上传时间:2019-06-14
  • 文档格式:PDF
  • 文档大小:2.37MB
  • / 27 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 1、Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets, URLs, IP addresses Open files User generated content Passwords, caches, clipboards Encryption keys Hardware and software configuration Windows registry keys and event logs Memory Analysis Advantages Best place to identify malicious software activity Study running system configuration Identify i

      2、nconsistencies (contradictions) in system Bypass packers, binary obfuscators, rootkits (including kernel mode) and other hiding tools. Analyze and track recent activity on the system Identify all recent activity in context Profile user or attacker activities Collect evidence that cannot be found anywhere else Memory-only malware Chat threads Internet activities What is Memory Forensics? Study of data captured from memory of a target system Ideal analysis includes physical memory data (from RAM)

      3、as well as Page File (or SWAP space) data Acquire Capture Raw Memory Hibernation File Context Establish Context Find Key Memory Offsets Analyze Analyze Data For Significant Elements Recover Evidence Windows Memory Acquisition LIVE System (RAM Acquisition) DumpIt.exe http:/ win32dd.exe / win64dd.exe Author: Matthew Suiche http:/ Mandiant Redline http:/ DEAD System Hibernation File Contains a compressed RAM Image %SystemDrive%/hiberfil.sys Win2k XP Win2003 VISTA Win2008 Windows 7 Virtual Machine M

      4、emory Acquisition VMware (Fusion/Workstation/Server/Player) .vmem file = raw memory image Microsoft Hyper-V .bin file = raw memory image Parallels .mem file = raw memory image VirtualBox .sav file = partial memory image Extract Memory from Hibernation File (hiberfil.sys) hibr2bin can acquire physical memory (RAM) from a Windows hibernation file (XP and VISTA only) Pro Version Compatible with XP-Win7/2008 (32 and 64 bit) hibr2bin.exe Location on COURSE DVD: D:windows forensic toolsmemory imaging

      5、Example: Extract hibernation file memory and save to a USB DRIVE D: hibr2bin D:hiberfil.sys E:hibernation_memory.img * Volatility can also convert hibernation files * DLL Injection Normal DLL Interaction ntdll.dll Kernel Library Call 1 2 3 4 User space Kernel space DLL Injection ntdll.dll Kernel Library Call 5 4 Rootkit 1 2 3 6 7 User space Kernel space Detecting Injection DLL injection is very common with modern malware VirtualAllocEx( ) and CreateRemoteThread( ) SetWindowsHookEx( ) Process hol

      6、lowing is another injection technique Malware starts a new instance of legitimate process Original process code de-allocated and replaced Retains DLLs, handles, data, etc. from original process Code injection is relatively easy to detect Review memory sections marked as Page_Execute_ReadWrite and having no memory-mapped file present Scan for DLLs (PE files) and shellcode Process image not backed with file on disk = process hollowing Zeus / Zbot Overview Persistent malware designed to steal crede

      7、ntials Many variants. A popular one does the following: Copies itself to %system32%sdra64.exe Injects code into winlogon.exe or explorer.exe Further injects code into every process but csrss & smss Auto-start path: HKLMSoftwareMicrosoftWindows NTwinlogonuserinit Creates local.ds & user.ds in %sytem32%lowsec Retrieves files from command and control server Mutant: _AVIRA_ Hooks over 50 system APIs Using Mandiant Redline Information Pane Process View Host View Guided Analysis Detecting Code Injecti

      8、on: Zeus/Zbot DLL Injection Detecting Code Injection: Finding Injected Sections Volatility Command-line memory forensic tool Primarily Windows-focused Linux (Android) & Mac support now available Modular, portable Help! The h flag gives configuration information in Volatility Used alone it identifies the version, currently loaded plugins, and common parameters Use h with a plugin to get details and plugin-specific usage Code Injection ldrmodules DLLs are tracked in three different linked lists fo

      9、r each process. Stealthy malware can unlink loaded DLLs from these lists. This plugin queries each list and displays the results for comparison. Purpose Verbose - show full paths from each of the three DLL lists (-v) Show information for specific process IDs (-p) Important Parameters Most loaded DLLs will be in all 3 lists, having a “1” in each column. Legitimate entries may be missing in some of the lists e.g. the process executable will not be present in the “InInit” list If an entry has no “MappedPath” information it is indicative of an injected DLL not available on disk (usually bad) Investigative Notes Rootkit Detection apihooks Detect inline and Import Address T

      《内存取证检测恶意木马》由会员第***分享,可在线阅读,更多相关《内存取证检测恶意木马》请在金锄头文库上搜索。

      点击阅读更多内容
    最新标签
    信息化课堂中的合作学习结业作业七年级语文 发车时刻表 长途客运 入党志愿书填写模板精品 庆祝建党101周年多体裁诗歌朗诵素材汇编10篇唯一微庆祝 智能家居系统本科论文 心得感悟 雁楠中学 20230513224122 2022 公安主题党日 部编版四年级第三单元综合性学习课件 机关事务中心2022年全面依法治区工作总结及来年工作安排 入党积极分子自我推荐 世界水日ppt 关于构建更高水平的全民健身公共服务体系的意见 空气单元分析 哈里德课件 2022年乡村振兴驻村工作计划 空气教材分析 五年级下册科学教材分析 退役军人事务局季度工作总结 集装箱房合同 2021年财务报表 2022年继续教育公需课 2022年公需课 2022年日历每月一张 名词性从句在写作中的应用 局域网技术与局域网组建 施工网格 薪资体系 运维实施方案 硫酸安全技术 柔韧训练 既有居住建筑节能改造技术规程 建筑工地疫情防控 大型工程技术风险 磷酸二氢钾 2022年小学三年级语文下册教学总结例文 少儿美术-小花 2022年环保倡议书模板六篇 2022年监理辞职报告精选 2022年畅想未来记叙文精品 企业信息化建设与管理课程实验指导书范本 草房子读后感-第1篇 小数乘整数教学PPT课件人教版五年级数学上册 2022年教师个人工作计划范本-工作计划 国学小名士经典诵读电视大赛观后感诵读经典传承美德 医疗质量管理制度 2 2022年小学体育教师学期工作总结
    关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
    手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
    ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.