Ethical hacking and countermeasures - phần 41 pdf

54 153 0
Ethical hacking and countermeasures - phần 41 pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Ehi l H ki d E t hi ca l H ac ki ng an d Countermeasures Vi 6 V ers i on 6 Module XLI Module XLI Hacking USB Devices News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.vnunet.com/ Module Objective This module will familiarize you with: •USB Devices • USB attacks • V iruses and worms • USB Hacking Tools • USB Security Tools • Countermeasures EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow USB Devices USB Hacking Tools USB attacks USB Security Tools USB attacks USB Security Tools Countermeasures Viruses and worms EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction to USB Devices Universal Serial Bus (USB) is a serial bus standard to interface devices Universal Serial Bus (USB) is a serial bus standard to interface devices It is pluggable, allowing device to be connected or removed while computer is running A pen drive is a compact, removable storage device just like a floppy disk or a CD A pen drive can be plugged into the USB port EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited A pen drive can be plugged into the USB port k USB Attac k s EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Electrical Attack Electrical attacks mounted against the USB keys require physical Electrical attacks mounted against the USB keys require physical access to the device circuit boards Primary goal is to access private data, which is supposed to be protected by legitimate user's PIN number or password without detection by the legitimate user A design flaw common to the USB keys is the improper storage of password values, which can allow the extraction of all data, including private information including private information Chan g in g the p assword value which is stored in an EEPROM EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited gg p allows access to the device and extract all private information Software Attack Attacker examines the communication channels between the USB device and h h ost computer It analyzes and determines the possibility to brute - force a password which It analyzes and determines the possibility to brute force a password which will give access to the USB key device B di i t d k USB k t t th USB k USB B y sen di ng i ncorrec t an d k nown erroneous USB pac k e t s t o th e USB k ey, USB may leak information such as the contents of protected memory areas EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited USB Attack on Windows Buffer-overflow vulnerabilities in USB device allow an attacker to bypass the id i d i d ii i iil fh h hi W i n d ows secur i ty an d ga i n a d m i n i strat i ve pr i v il eges o f t h e h ost mac hi ne A ttacker havin g idea about the vulnerabilit y in a USB device driver can p ro g ram gy pg one USB device, known as portable memory stick, to pose as the kind of device that uses the vulnerable driver Attacker then plugs the device into the host system and triggers the exploit when the host system loads the flawed driver This allows an attacker to take control of host computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Viruses And Worms Viruses And Worms EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited [...]... EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Worm: W32/Hasnot-A W32/Hasnot-A is a worm and companion virus for the Windows platform, which platform spreads via Removable storage devices W32/Hasnot-A will hide files and folders, appending the original file or folder name to a copy of itself Once installed, W32/Hasnot-A spreads through network shares and. .. uninfected computer EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/LiarVB-A W32/LiarVB-A is a worm for the Windows platform l tf Once i t ll d W32/Li VB A spreads O installed, W32/LiarVB-A d through network shares and removable storage devices, including floppy drives and USB keys W32/LiarVB-A copies itself to the root folder of the drive and adds an autorun.inf... autorun.inf file W32/LiarVB-A leaves an html file on the infected system with a message about AIDS i f d ih b EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/Hairy-A W32/Hairy-A is a worm for the Windows platform EC-Council W32/Hairy-A will attempt to copy itself and create autorun.inf autorun inf to removable drives W32/Hairy-A changes settings for Microsoft... plugged in W32/QQRob-ADN attempts to block access to security-related 3 /QQ p y sites by modifying the HOSTS file EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/VBAut-B W32/VBAut-B h functionality t spread via removable storage d i W /VBA t B has f ti lit to d i bl t devices and Instant Messaging protocols and to download, install, and run new software... EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited HTTP W32.Drom HTTP W32.Drom is a worm for the Windows platform W32.Drom is a worm that downloads and executes malicious files on the compromised computer and spreads through removable storage devices EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Hacking Tools EC-Council... device name and description, it displays the serial number, date the device was added and last connected number connected, VendorID, and other information USBDeview can also be used to gather USB devices from a remote computer via command line EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited USBDeview: Screenshot 1 EC-Council Copyright © by EC-Council All... copies itself to the removable drive with the hidden filename \handydriver.exe EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/SillyFDC-BK W32/SillyFDC-BK is a worm for the Windows platform W32/SillyFDC-BK spreads via removable shared drives by copying itself to \krage.exe and creating the file \autorun.inf File \autorun.inf is... the functionality to access the Internet and communicate with a remote server via HTTP It attempts to p od p o periodically copy itself to removable d y opy o o b drives, , including floppy drives and USB keys EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/Fujacks-E W3 / ujac s W32/Fujacks-E is a prepending virus and worm with s p epe d g v us a d o t... connect and disconnect activity Gives an email notification message when an unauthorized USB storage device is connected to your PC EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited MyUSBonly: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited MyUSBonly: Screenshot 2 EC-Council Copyright © by EC-Council... virus is also executed EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited W32/SillyFD-AA W32/SillyFD-AA is a worm for the Windows platform Once installed, W32/SillyFD-AA spreads through removable W32/SillyFD AA storage devices, including floppy drives and USB keys This worm attempts to create a hidden file Autorun.inf on the removable drive and copies itself to . Prohibited Viruses And Worms Viruses And Worms EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Virus: W32/Madang-Fam W32/Madang-Fam is a family of. Prohibited Module Flow USB Devices USB Hacking Tools USB attacks USB Security Tools USB attacks USB Security Tools Countermeasures Viruses and worms EC-Council Copyright © by EC-Council All Rights Reserved you with: •USB Devices • USB attacks • V iruses and worms • USB Hacking Tools • USB Security Tools • Countermeasures EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is

Ngày đăng: 02/08/2014, 11:20

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan