Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Post on 08-Jul-2015

551 views 1 download

Tags:

description

More info on http://techdays.be.

Transcript of Techniques for Hiding and Detecting Traces aka. Crouching Admin, Hidden Hacker

Crouching Admin, Hidden Hacker

Paula JanuszkiewiczCQURE: CEO, Penetration Tester

iDesign: Security Architect

Paula Januszkiewicz

CQURE: CEO, Penetration Tester

iDesign: Security Architect

paula@cqure.pl | paula@idesign.net

http://idesign.net

Contact

Session Goals

Be familiar with the possibilies of the operating system

Agenda

Operating System Accountability

Agenda

Operating System Logging

Mechanisms

http://www.clearci.com

Logs Less & More

Advanced

Hacker’s Delivery

Services & ACLs

demo

Replacing Files

"Vulnerabilities"

demo

Launching Evil Code

http://stderr.pl/cqure/stuxnet.zip

Services (In)Security

From A to Z - DLLs

Kernel Traces

Areas of Focus

Agenda

Dirty Games: Hiding Mechanisms

Hidden Processes

Dirty Games: Protection Mechanisms

Protected Processes

Dirty Games: Hooks

Hooking

3 of 10 Immutable Laws of Security

Agenda

Summary