Linux Malware

Linux Malware

Linux Malware Looks don’t matter Michael Boelen [email protected] 2016-07-06 ‘s-Hertogenbosch, The Netherlands Agenda Today 1. How do “they” get in 2. Why? 3. Malware types 4. In-depth: rootkits 5. Defenses 2 Interactive ● Ask ● Share ● Presentation 3 Michael Boelen ● Security Tools ○ Rootkit Hunter (malware scan) ○ Lynis (security audit) ● 180+ blog posts ● Founder of CISOfy 4 How do “they” get in Intrusions ● Simple passwords ● Vulnerabilities ● Weak configurations ● Clicking on attachments ● Open infected programs 6 Why? Why? ● Spam ● Botnet 8 9 Types Types ● Virus ● Worm ● Backdoor ● Dropper ● Rootkit 12 Rootkits 101 Rootkits ● (become | stay) root ● (software) kit 14 Rootkits ● Stealth ● Persistence ● Backdoor 15 How to be the best rootkit? Hiding ★ In plain sight! /etc/sysconfig/… /tmp/mysql.sock /bin/audiocnf 17 Hiding ★★ Slightly advanced ● Rename processes ● Delete file from disk ● Backdoor binaries 18 Hiding ★★★ Advanced ● Kernel modules ● Change system calls ● Hidden passwords 19 Little Demo Demo 21 Demo 22 Rootkit Hunter Detect the undetectable! 23 Challenges ● We can’t trust anything ● Even ourselves ● No guarantees 25 Continuous Game 26 Defense Defenses At least ● Perform security scans ● Protect your data ● System hardening 28 Scanning » Scanners ● Viruses → ClamAV ● Backdoors → LMD ● Rootkits → Chkrootkit / rkhunter 29 Scanning » File Integrity ● Changes ● Powerful detection ● Noise AIDE / Samhain 30 System Hardening » Lynis ● Linux / UNIX ● Open source ● Shell ● Health scan 31 Conclusions Conclusions ● Challenge: rootkits are hard to detect ● Prevent: system hardening ● Detect: recognize quickly, and act 33 Success! You finished this presentation More Linux security? Presentations michaelboelen.com/presentations/ Follow ● Blog Linux Audit (linux-audit.com) ● Twitter @mboelen 35 36.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    36 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us