Top Banner
Cyber Crime Tanmay S Dikshit
22

Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Dec 26, 2015

Download

Documents

Fay Barrett
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Cyber Crime

Tanmay S Dikshit

Page 2: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.
Page 3: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 1 Reconnaissance

• Finding out about the target• Scan a well known site and

find the hosts around it (Port Scan)

• Use of Botnets

Page 4: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 2 Weaponization

• Target a specific or a group of targets

• Exploit a vulnerability• Target a specific site

Page 5: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 3 Delivery

• Infect a document to send via Email

• Infect a website with a malware• Use stolen or default credentials• Identify flaws in exposed software

Page 6: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 4 Exploitation

• Exploit Software• Remote stream of packets to

exposed host

Page 7: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 5 Installation

• Payload executes and continues to execute.

• Registry key that starts the software.

Page 8: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 6 Command and Control

• Attack may carry out action for long time

• Payload may provide long term source of intelligence

Page 9: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Stage 7 Actions

• Depends on motives of attacker

• Defacement• Information theft• Money Theft

Page 10: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.
Page 11: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Case Study

• Lockheed Martin- Computer Incident Response Team (LM-CIRT) March 2009

• 3 intrusions• Common Advanced Persistent Threat

tactic• Use of Targeted malicious email

Page 12: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Case Study LM-CIRT March 2009

• APT tactic: A suspicious email attachment

• About: American Institute of Aeronautics and Astronautics (AIAA) conference.

• Sender: Authorized employee• Receiver: Only 5 users

Page 13: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 1

Received: (qmail 71864 invoked by uid 60001); Tue, 03 Mar 2009 15:01:19 +0000

Received: from [60.abc.xyz.215] by web53402.mail.re2.yahoo.com via HTTP; Tue, 03 Mar 2009 07:01:18 -0800 (PST) Date: Tue, 03 Mar 2009 07:01:18 -0800 (PST) From: Anne E... <[email protected]>

Subject: AIAA Technical Committees To: [REDACTED]Reply-to: [email protected] Message-id:

<[email protected]>MIME-version: 1.0 X-Mailer: YahooMailWebService/0.7.289.1Content-type: multipart/mixed; boundary=

"Boundary_(ID_Hq9CkDZSoSvBMukCRm7rsg)” X-YMail-OSG:Please submit one copy (photocopies are acceptable) of this

form, and onecopy of nominee's resume to: AIAA Technical Committee

Nominations,1801 Alexander Bell Drive, Reston, VA 20191. Fax number is

703/264-7551. Form can also be submitted via our web site at

www.aiaa.org, InsideAIAA, Technical Committees

Email Header

Page 14: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 1

The email contained a pdf file which was actually:• a benign PDF and • a Portable Executable (PE) backdoor installation

file.• encrypted using a trivial algorithm with an 8-bit

key stored in the exploit shellcode.

On Installation: 1. C:\Documents and Settings\[username]\Local

Settings\fssm32.exe2. Opens the benign pdf The pdf is same as what was available on AIAA

website at http://www.aiaa.org/pdf/inside/tcnom.pdf

The attack

Page 15: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 1

Page 16: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 2

Received: (qmail 97721 invoked by uid 60001); 4 Mar 2009 14:35:22 -0000 Message-ID: <[email protected]>

Received: from [216.abc.xyz.76] by web53411.mail.re2.yahoo.com via HTTP; Wed,04 Mar 2009 06:35:20 PST

X-Mailer: YahooMailWebService/0.7.289.1Date: Wed, 4 Mar 2009 06:35:20 -0800 (PST)From: Anne E... <[email protected]>Reply-To: [email protected]: 7th Annual U.S. Missile Defense ConferenceTo: [REDACTED]MIME-Version: 1.0Content-Type: multipart/mixed; boundary="0-760892832-

1236177320=:97248"Welcome to the 7th Annual U.S. Missile Defense Conference

Email Header

Page 17: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 2

The email contained a pdf file which was actually:• a benign PDF MDA_Prelim_2.pdf and • a Portable Executable (PE) backdoor installation

file.• encrypted using a trivial algorithm with an 8-bit

key stored in the exploit shellcode.

On Installation: 1. C:\Documents and Settings\[username]\Local

Settings\fssm32.exe2. Opens the benign pdf The pdf is same as what was available on AIAA

website at http://www.aiaa.org/events/missiledefense/MDA_Prelim_09.pdf

The attack

Page 18: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 2

Page 19: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 3

• Received: (qmail 62698 invoked by uid 1000); Mon, 23 Mar 2009 17:14:22 +0000

• Received: (qmail 82085 invoked by uid 60001); Mon, 23 Mar 2009 17:14:21 +0000

• Received: from [216.abc.xyz.76] by web43406.mail.sp1.yahoo.com via HTTP; Mon,

• 23 Mar 2009 10:14:21 -0700 (PDT)• Date: Mon, 23 Mar 2009 10:14:21 -0700 (PDT)• From: Ginette C... <[email protected]>• Subject: Celebrities Without Makeup• To: [REDACTED]• Message-id: <[email protected]>• MIME-version: 1.0• X-Mailer: YahooMailClassic/5.1.20 YahooMailWebService/0.7.289.1• Content-type: multipart/mixed;

boundary="Boundary_(ID_DpBDtBoPTQ1DnYXw29L2Ng)"• <email body blank>

Email Header

Page 20: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 3

The email contained a powerpoint file which was actually:

• a malicious power-point file exploiting a Microsoft zero-day exploit

• Exploit was publicly acknowledged after 10 days

• Microsoft released a patch after a month

The attack

Page 21: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Intrusion 3

Page 22: Cyber Crime Tanmay S Dikshit. Stage 1 Reconnaissance Finding out about the target Scan a well known site and find the hosts around it (Port Scan) Use.

Cyber Security

• Intelligence-Driven Computer Network Defense

• Adversary Campaigns Analysis

• Intrusion Kill Chains