DecodingandUnderstandingInternetWorms.ppt
Decoding and Understanding Internet Worms Course Overview Basic overview / history of worms Worm analysis techniques Worms – under the hood Worm defense techniques The future of worms Questions and answers Internet Worms-Defined A worm is a self propagating piece of malicious software. It attacks vulnerable hosts, infects them, then uses them to attack other vulnerable hosts Internet Worms-Who Writes Them Hacker/Crackers Researchers Virus Writers Internet Worms-Worms vs. Viruses Viruses require interaction Worms act on their own Viruses use social attacks Worms use technical attacks Internet Worms-History Morris Internet Worm Released in 1998 Overloaded VAX and Sun machines with invisible processes 99 line program written by 23 year old Robert Tappan Morris Exploit xyz Internet Worms-History First worms were actually designed and released in the 1980’s Worms were non-destructive and generally were released to perform helpful network tasks Vampire worm: idle during the day, at night would use spare CPU cycles to perform complex tasks that required the extra computing power Internet Worms-History Eventually negative aspects of worms came to light An internal Xerox worm had crashed all the computers in a particular research center When machines were restarted the worm re-propagted and crashed the machines again Worm Analysis Techniques-Capture: Capturing from the Network Sniffers IDS Netcat Listeners Specialized Servers (earlybird, etc) Worm Analysis Techniques-Capture: Capturing from Memory Memory Dumps Memory Searches Crashing to preserve memory Worm Analysis Techniques-Capture: Capturing from Disk File searches File monitoring Open handles Email Replicated/Infected files Worm Analysis Techniques-Dissection / Disassembly: Loading Loading files in ida Initial Settings Trojans vs. Exploit Style worms Trojans load as programs Exploits load as baseless code Worm Analysis Techniques-Dissection / Disassembly: Defining Setting variables Examining functi
您可能关注的文档
- 102年度台中市国民小学暑期分区「英语国际生活营」实施计画.doc
- 2013-2017年猪肉行业竞争格局与投资战略研究咨询报告.doc
- 2013—2014年民乐一中高三五月诊断文综政治试卷.doc
- 6计算机辅助生产与质量管理.ppt
- AMeasurementStudyofVehicularInternetAccessUsingIn.ppt
- ANDCHEMICALPROPERTIESONTHEINTERNET.ppt
- BasicPricingPrinciple&theInternet.ppt
- CISCOINTERNETLEARNINGSOLUTIONSFORPRODUC.ppt
- CreatinganERDusingMicrosoftVISIO.doc
- InternetandNetworkingTerms.ppt
- 小区绿化施工协议书.docx
- 墙面施工协议书.docx
- 1 古诗二首(课件)--2025-2026学年统编版语文二年级下册.pptx
- (2026春新版)部编版八年级道德与法治下册《3.1《公民基本权利》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《4.3《依法履行义务》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.2《按劳分配为主体、多种分配方式并存》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.1《公有制为主体、多种所有制经济共同发展》PPT课件.pptx
- 初三教学管理交流发言稿.docx
- 小学生课外阅读总结.docx
- 餐饮门店夜经济运营的社会责任报告(夜间贡献)撰写流程试题库及答案.doc
原创力文档

文档评论(0)