Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Malware Avoidance with Open Source Software

Malware Avoidance with Open Source Software

Open source technologies that being used for malware detection

Avatar for Muhammad Najmi Ahmad Zabidi

Muhammad Najmi Ahmad Zabidi

November 06, 2009
Tweet

More Decks by Muhammad Najmi Ahmad Zabidi

Other Decks in Technology

Transcript

  1. myGOSSCON 2009, Malaysia Welcome Malware Avoidance with Open Source Software

    Muhammad Najmi bin Ahmad Zabidi Department of Computer Science Kulliyyah of Information & Communication Technology International Islamic University Malaysia 6th November 2009 najmi@kict.iiu.edu.my Created with L A T EX Muhammad Najmi myGOSSCON 2009, Malaysia
  2. myGOSSCON 2009, Malaysia Agenda Agenda I 1 What this presentation

    covers. . . 2 Intro 3 Malware origin 4 Malware infection method 5 Malware behavior 6 Malware Communication Robot network botnet Vicious circle of evils Logging communications Logs Graphviz diagram Logs Logs in a table Some math stuffs Muhammad Najmi myGOSSCON 2009, Malaysia
  3. myGOSSCON 2009, Malaysia Agenda Agenda II Capabilities Issues in malware

    containment 7 Tools 8 Selection of solutions IDS Antivirus and friends Reporting sensors 9 Nepenthes Honeypot Setup Setup Malware flow illustrated 10 Amun Honeypot List of open connections Muhammad Najmi myGOSSCON 2009, Malaysia
  4. myGOSSCON 2009, Malaysia Agenda Agenda III 11 SurfIDS 12 New

    honeypot Dionaea 13 Toying with binaries Analyst tools Emulation IDS Nebula 14 Conclusion Muhammad Najmi myGOSSCON 2009, Malaysia
  5. myGOSSCON 2009, Malaysia What this presentation covers. . . What

    this presentation covers. . . User’s perspective Host level IT admin perspective Network level, policy level Muhammad Najmi myGOSSCON 2009, Malaysia
  6. myGOSSCON 2009, Malaysia What this presentation covers. . . Focus.

    . . We’ll go on the malware origin Later the problem they cause Finally the containment/threat prevention method I use the word avoidance since it is broad . . . Muhammad Najmi myGOSSCON 2009, Malaysia
  7. myGOSSCON 2009, Malaysia Intro Intro to Malware Malware is a

    shortform for Malicious Software Motives : Identity theft (privacy breach) Financial loss (which may caused by above) Denial of service Information espionage Underground economics Muhammad Najmi myGOSSCON 2009, Malaysia
  8. myGOSSCON 2009, Malaysia Malware origin What is malware It is

    a program, doing malicious activity Also known as a binary, since it is in a compiled nature Some actions that it can do after infection are: Delete files Lock command from user, say Ctrl+Alt+Del Prevent connection to antivirus(AV) websites - e.g Conficker did this Remotely activate webcam - espionage purpose .. or perhaps peeping Remember ghostnet? Affect mainly Windows, there’s existence on Linux too Muhammad Najmi myGOSSCON 2009, Malaysia
  9. myGOSSCON 2009, Malaysia Malware infection method How malware infect machines

    It can infect a machine by. . . Drive by downloads Email attachments File shares Decoy (warez movies, free wallpaper and stuffs) Muhammad Najmi myGOSSCON 2009, Malaysia
  10. myGOSSCON 2009, Malaysia Malware behavior The behavior of malware Pretend

    to be a normal system process Current method - packing - more sophisticated, since it can minimize its size while being an executable file If it is a botnet, it starts to create communication to external machines Muhammad Najmi myGOSSCON 2009, Malaysia
  11. myGOSSCON 2009, Malaysia Malware Communication Robot network botnet Botnets Botnet,

    a robot network communicates to its herder Known as C & C Communication can be viewed by looking at open ports used Muhammad Najmi myGOSSCON 2009, Malaysia
  12. myGOSSCON 2009, Malaysia Malware Communication Vicious circle of evils Decieved

    malware 1 9 2 . 1 6 8 . 2 . 8 2 − > 192 .168 .1.245 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 8 2 : 8 5 1 9 / setup 42278 . exe 192.168.2. 131 − > 192 .168 .1.251 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 1 3 1 : 1 3 5 5 2 / setup 51182 . exe 1 9 2 . 1 6 8 . 2 . 8 2 − > 192 .168 .1.234 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 8 2 : 8 5 1 9 / setup 60058 . exe 1 9 2 . 1 6 8 . 2 . 5 8 − > 192 .168 .1.248 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 5 8 : 5 3 9 9 / setup 15538 . exe 192.168.2. 131 − > 192 .168 .1.243 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 1 3 1 : 1 3 5 5 2 / setup 14445 . exe 1 9 2 . 1 6 8 . 2 . 8 2 − > 192 .168 .1.231 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 8 2 : 8 5 1 9 / setup 13836 . exe 192.168.2. 131 − > 192 .168 .1.242 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 1 3 1 : 1 3 5 5 2 / eraseme 22402 . exe 192.168.2. 131 − > 192 .168 .1.242 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 1 3 1 : 1 3 5 5 2 / setup 75276 . exe 1 9 2 . 1 6 8 . 2 . 8 8 − > 192 .168 .1.248 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 8 8 : 2 6 6 5 5 / setup 17788 . exe 192.168.2. 131 − > 192 .168 .1.231 f t p : / / 1 : 1 @192 . 1 6 8 . 2 . 1 3 1 : 1 3 5 5 2 / setup 24346 . exe Muhammad Najmi myGOSSCON 2009, Malaysia
  13. myGOSSCON 2009, Malaysia Malware Communication Logs Visualization program Visualization can

    helps in term of data analyzing Tools available - graphviz for example Or you may just read log file. . . but don’t that hurts you in any way? Muhammad Najmi myGOSSCON 2009, Malaysia
  14. myGOSSCON 2009, Malaysia Malware Communication Logs Look at this illustrated

    sensor logs Muhammad Najmi myGOSSCON 2009, Malaysia
  15. myGOSSCON 2009, Malaysia Malware Communication Logs Malware’s Name Originated IPs

    Submission attempt Trojan.Kolabc.BFY 192.168.2.141 210 192.168.2.131 107 192.168.2.214 35 192.168.2.82 14 192.168.2.52 8 192.168.2.37 2 Trojan.SdBot-8638 192.168.2.100 92 Worm.Kolab-284 192.168.2.153 4 192.168.2.58 34 192.168.2.214 21 192.168.2.55 60 192.168.2.155 1 Trojan.DsBot-15 192.168.2.51 271 Muhammad Najmi myGOSSCON 2009, Malaysia
  16. myGOSSCON 2009, Malaysia Malware Communication Some math stuffs Malware propagation

    rate da dt = Ka(1a) where a = eK(t−T) 1 + eK(t−T) The number of infected hosts at time t if K is known. (Nazario) Explanation by (Goranin et. al,2008) K is the constant average compromise rate, which is de- pendant on worm processor speed, network bandwidth and location of the infected host a(t) is the proportion of vulnerable machines which have been compromised at the instant t, Na(t) is the number of infected hosts, each of which scans other vulnerable machines at a rate K per unit of time. Since a portion a(t) of the vulnerable machines is already infected, only K(1-a(t)) new infections will be generated by each infected host, per unit of time. The number n of machines that will be compromised in the interval of time dt (in which a is assumed to be constant) Muhammad Najmi myGOSSCON 2009, Malaysia
  17. myGOSSCON 2009, Malaysia Malware Communication Some math stuffs Malware and

    ports Malware’s Name Origin IP FTP ports No of time used Trojan.DsBot-15 192.168.2.51 15807 2 19735 2 23154 2 30487 2 10040 3 Trojan.SdBot-8638 192.168.2.100 4471 44 17747 44 Muhammad Najmi myGOSSCON 2009, Malaysia
  18. myGOSSCON 2009, Malaysia Malware Communication Capabilities What it does Mass

    scanning Find vulnerable machines Since it’s a parasite, it start consumes its host resources Processing power Storage Muhammad Najmi myGOSSCON 2009, Malaysia
  19. myGOSSCON 2009, Malaysia Malware Communication Issues in malware containment Issue

    What make it so troublesome. . . Malware also become open source, even some was GPL’ed! Experienced, professional cyber criminal Tools to create malware are also available Botherders rent their malware for profit Fastflux problem Become a problem to crack down Malware analysis is challenging Malware become polymorphic, metamorphic Use code obfuscation, anti disassembly, anti forensic, anti sandbox etc Some use encryption, even beta - md6! Muhammad Najmi myGOSSCON 2009, Malaysia
  20. myGOSSCON 2009, Malaysia Selection of solutions IDS Intrusion Detection/Prevention Snort

    Hogwash Snort inline SurfIDS Muhammad Najmi myGOSSCON 2009, Malaysia
  21. myGOSSCON 2009, Malaysia Selection of solutions Antivirus and friends AV

    related tools ClamAV Currently under Sourcefire Sourcefire sponsors Snort IDS too WinPooch seems abandoned hence abandonware it works side by side with ClamAV or Bitdefender Muhammad Najmi myGOSSCON 2009, Malaysia
  22. myGOSSCON 2009, Malaysia Selection of solutions Reporting sensors How to

    obtain data for analysis Methods Deploy sensors IDS/IPS Honeypot Network Management System, e.g : OpenNMS Collect binaries Nepenthes sensor for example, allow automated binary submission to sandboxes Turn on reporting Analyze infected host Clean up infected host Muhammad Najmi myGOSSCON 2009, Malaysia
  23. myGOSSCON 2009, Malaysia Selection of solutions Reporting sensors Honeypot Honeypot

    emulates operating system (heavy) or services (light) It can be either server (passive) or client (active crawl) Light interaction Emulates potential vulnerable services i.e HTTP,FTP,SSH Most of the time attracts automated malware Heavy interaction A dedicated machine, which emulates real machine and software Difficult(relatively) Known to attract real attacker (human) Muhammad Najmi myGOSSCON 2009, Malaysia
  24. myGOSSCON 2009, Malaysia Selection of solutions Reporting sensors Comparison Light

    interaction Nepenthes Glastopf Labrea tinyhoneypot Amun Dionaea Kojoney Capture-HPC Heavy interaction Honeyd Muhammad Najmi myGOSSCON 2009, Malaysia
  25. myGOSSCON 2009, Malaysia Selection of solutions Reporting sensors Some other

    stuffs. . . FFdetect detects fast-flux domain CaptureBAT analyze outputs from CaptureHPC Malzilla Muhammad Najmi myGOSSCON 2009, Malaysia
  26. myGOSSCON 2009, Malaysia Nepenthes Honeypot Setup Nepenthes setup Since I

    was using Nepenthes so I’ll share my experience Set virtual IPs.. either local IPs or public IPs Only use unused IPs with permission, somebody may complain later :— Since Linux allow IP aliasing, you can simulate hundreds of IPs, as if there’s a lot of machines Nepenthes emulates Windows vulnerable services Muhammad Najmi myGOSSCON 2009, Malaysia
  27. myGOSSCON 2009, Malaysia Nepenthes Honeypot Setup Nepentes setup Relatively easy

    . . . as easy as “apt-get install nepenthes” Tune a little bit on config file, such as services that you plan to emulate and your email address Will generate a lot of alerts if you’re in polluted traffic IP aliasing can be done by for x in ‘seq in 230 254‘ ; do ip addr add 192.168.1.$x/24 dev eth0; done Muhammad Najmi myGOSSCON 2009, Malaysia
  28. myGOSSCON 2009, Malaysia Amun Honeypot Amun. . . najmi@notre−dame :˜/

    Desktop /amun$ sudo ./ amun server . py [ sudo ] password f o r najmi : / \ / / \ \ / \| | \/ \ / | \ Y Y \ | / | \ \ | / | | / /| | / \/ \/ \/ s t a r t i n g Amun s e r v e r . . . . : : [ Amun − Main ] a l l s e r v e r s l i s t e n i n g on : 0 . 0 . 0 . 0 : : . . : : [ Amun − Main ] l o a d i n g v u l n e r a b i l i t y modul vuln−ms08067 : : . . : : [ Amun − Main ] l o a d i n g v u l n e r a b i l i t y modul vuln−wins : : . . : : [ Amun − Main ] l o a d i n g v u l n e r a b i l i t y modul vuln−axigen : : . . : : [ Amun − Main ] l o a d i n g v u l n e r a b i l i t y modul vuln−s l m a i l : : . . . . . . . . . . . . . : : [ Amun − Decoder ] c o m p i lin g bonn xor decoder : : . . : : [ Amun − Decoder ] c o m p i lin g p l a i n 1 s h e l l c o d e : : . . : : [ Amun − Decoder ] c o m p i lin g p l a i n 2 s h e l l c o d e : : . . : : [ Amun − amun server ] Port a l r e a d y i n use : IP : 0 . 0 . 0 . 0 Port : 25 : : . . : : [ Amun − Main ] ready f o r e v i l o r d e r s : : : . Muhammad Najmi myGOSSCON 2009, Malaysia
  29. myGOSSCON 2009, Malaysia Amun Honeypot List of open connections Open

    connections Snipped output of list of open files (lsof) root@notre−dame:˜# l s o f −Pni | grep amun . . . . . . . . . . amun serv 22500 root 15u IPv4 276034 TCP ∗:21 (LISTEN) amun serv 22500 root 16u IPv4 276035 TCP ∗:23 (LISTEN) amun serv 22500 root 17u IPv4 276036 TCP ∗:38736 (LISTEN) amun serv 22500 root 30u IPv4 276049 TCP ∗:1025 (LISTEN) amun serv 22500 root 31u IPv4 276050 TCP ∗:1111 (LISTEN) amun serv 22500 root 32u IPv4 276051 TCP ∗:1581 (LISTEN) amun serv 22500 root 56u IPv4 276075 TCP ∗:41523 (LISTEN) Muhammad Najmi myGOSSCON 2009, Malaysia
  30. myGOSSCON 2009, Malaysia SurfIDS What is SurfIDS As the name

    suggests, it is an IDS Development led by a group of researcher in Univ of Amsterdam Offers system install or USB as sensor Muhammad Najmi myGOSSCON 2009, Malaysia
  31. myGOSSCON 2009, Malaysia New honeypot Dionaea Dionaea Currently developed by

    Markus Koetter as a part of GSoC, Google Summer of Code Suppose to be better than Nepenthes Check http://dionaea.carnivore.it/ Muhammad Najmi myGOSSCON 2009, Malaysia
  32. myGOSSCON 2009, Malaysia New honeypot Dionaea Before . . .

    $nmap l o c a l h o s t S t a r t i n g Nmap 4.76 ( http :// nmap . org ) at 2009−10−31 12:42 MYT Warning : Hostname l o c a l h o s t r e s o l v e s to 2 IPs . Using 1 2 7 . 0 . 0 . 1 . I n t e r e s t i n g p o r t s on l o c a l h o s t ( 1 2 7 . 0 . 0 . 1 ) : Not shown : 994 c l o s e d p o r t s PORT STATE SERVICE 22/ tcp open ssh 25/ tcp open smtp 631/ tcp open ipp 9091/ tcp open unknown 15000/ tcp open unknown 45100/ tcp open unknown Muhammad Najmi myGOSSCON 2009, Malaysia
  33. myGOSSCON 2009, Malaysia New honeypot Dionaea Execute . . .

    nmap l o c a l h o s t / opt / dionaea / bin / dionaea −l a l l ,−debug −L ’∗ ’ Dionaea Version 0 . 1 . 0 Compiled on Linux /x86 at Oct 31 2009 00:23:48 with gcc 4 . 3 . 3 S t a r t e d on notre−dame running Linux / i686 r e l e a s e 2.6.28−15− g e n e r i c Muhammad Najmi myGOSSCON 2009, Malaysia
  34. myGOSSCON 2009, Malaysia New honeypot Dionaea After . . .

    $nmap l o c a l h o s t S t a r t i n g Nmap 4.76 ( http :// nmap . org ) at 2009−10−31 12:46 MYT Warning : Hostname l o c a l h o s t r e s o l v e s to 2 IPs . Using 1 2 7 . 0 . 0 . 1 . I n t e r e s t i n g p o r t s on l o c a l h o s t ( 1 2 7 . 0 . 0 . 1 ) : Not shown : 988 c l o s e d p o r t s PORT STATE SERVICE 21/ tcp open f t p 22/ tcp open ssh 25/ tcp open smtp 42/ tcp open nameserver 80/ tcp open http 135/ tcp open msrpc 443/ tcp open h t t p s 445/ tcp open microsoft−ds 631/ tcp open ipp 9091/ tcp open unknown 15000/ tcp open unknown 45100/ tcp open unknown Muhammad Najmi myGOSSCON 2009, Malaysia
  35. myGOSSCON 2009, Malaysia New honeypot Dionaea Check services . .

    . dionaea 4590 root 8u IPv4 176514 TCP 1 2 7 . 0 . 0 . 1 : 8 0 (LISTEN) dionaea 4590 root 9u IPv4 176515 TCP 1 2 7 . 0 . 0 . 1 : 4 4 3 (LISTEN) dionaea 4590 root 10u IPv4 176518 UDP 1 2 7 . 0 . 0 . 1 : 6 9 dionaea 4590 root 11u IPv4 176519 TCP 1 2 7 . 0 . 0 . 1 : 2 1 (LISTEN) dionaea 4590 root 12u IPv4 176520 TCP 1 2 7 . 0 . 0 . 1 : 4 2 (LISTEN) dionaea 4590 root 13u IPv4 176521 TCP 1 2 7 . 0 . 0 . 1 : 4 4 5 (LISTEN) dionaea 4590 root 14u IPv4 176522 TCP 1 2 7 . 0 . 0 . 1 : 1 3 5 (LISTEN) dionaea 4590 root 15u IPv6 176523 TCP [ : : 1 ] : 8 0 (LISTEN) dionaea 4590 root 16u IPv6 176524 TCP [ : : 1 ] : 4 4 3 (LISTEN) dionaea 4590 root 17u IPv6 176529 UDP [ : : 1 ] : 6 9 dionaea 4590 root 18u IPv6 176530 TCP [ : : 1 ] : 2 1 (LISTEN) dionaea 4590 root 19u IPv6 176531 TCP [ : : 1 ] : 4 2 (LISTEN) dionaea 4590 root 20u IPv6 176532 TCP [ : : 1 ] : 4 4 5 (LISTEN) dionaea 4590 root 21u IPv6 176533 TCP [ : : 1 ] : 1 3 5 (LISTEN) dionaea 4590 root 22u IPv4 176534 TCP 1 9 2 . 1 6 8 . 2 . 2 : 8 0 (LISTEN) dionaea 4590 root 23u IPv4 176535 TCP 1 9 2 . 1 6 8 . 2 . 2 : 4 4 3 (LISTEN) dionaea 4590 root 24u IPv4 176542 UDP 1 9 2 . 1 6 8 . 2 . 2 : 6 9 dionaea 4590 root 25u IPv4 176543 TCP 1 9 2 . 1 6 8 . 2 . 2 : 2 1 (LISTEN) dionaea 4590 root 26u IPv4 176544 TCP 1 9 2 . 1 6 8 . 2 . 2 : 4 2 (LISTEN) dionaea 4590 root 27u IPv4 176545 TCP 1 9 2 . 1 6 8 . 2 . 2 : 4 4 5 (LISTEN) dionaea 4590 root 28u IPv4 176546 TCP 1 9 2 . 1 6 8 . 2 . 2 : 1 3 5 (LISTEN) dionaea 4590 root 29u IPv6 176549 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 8 0 (LISTEN) dionaea 4590 root 30u IPv6 176554 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 4 4 3 (LISTEN) dionaea 4590 root 31u IPv6 176567 UDP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 6 9 dionaea 4590 root 32u IPv6 176572 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 2 1 (LISTEN) dionaea 4590 root 33u IPv6 176577 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 4 2 (LISTEN) dionaea 4590 root 34u IPv6 176582 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 4 4 5 (LISTEN) dionaea 4590 root 35u IPv6 176587 TCP [ fe80 : : 2 1 3 : c e f f : feba : cedf ] : 1 3 5 (LISTEN) Muhammad Najmi myGOSSCON 2009, Malaysia
  36. myGOSSCON 2009, Malaysia New honeypot Dionaea Ok, now we already

    got the binaries, what is next? Muhammad Najmi myGOSSCON 2009, Malaysia
  37. myGOSSCON 2009, Malaysia Toying with binaries Analyst tools Analysis of

    binaries I Static Analysis *nix strings, strace, ltrace, lsof Objdump readelf Ollydbg though is free, but yet to be open sourced Muhammad Najmi myGOSSCON 2009, Malaysia
  38. myGOSSCON 2009, Malaysia Toying with binaries Analyst tools Analysis of

    binaries II Dynamic Analysis Anubis Open framework, but source code isn’t available Running of Qemu Wepawet Service is free,handling Flash/JavaScript files Bitblaze Developed by Univ of Berkeley Muhammad Najmi myGOSSCON 2009, Malaysia
  39. myGOSSCON 2009, Malaysia Toying with binaries Emulation What to emulate?

    Qemu and Virtualbox can be used as a sandbox as well Since malware loaded on a virtual machine, chance is safer than running on host machine But for precautious purpose, plug it off from any networking device Apart from them, Wine can be used as a fishbowl as well Unless it’s a wine-aware malware, you should be able to look at the malware’s behavior on guest OS Muhammad Najmi myGOSSCON 2009, Malaysia
  40. myGOSSCON 2009, Malaysia Toying with binaries IDS IDS on sensing

    worms IDS is Intrusion Detection System Trigger alerts Somehow a project such as snort inline includes firewall reaction hence it’s known as an IPS - P for prevention IDS can be used to trigger the existence of malicious attack Remember Conficker? Muhammad Najmi myGOSSCON 2009, Malaysia
  41. myGOSSCON 2009, Malaysia Toying with binaries IDS IDS signature generator

    Why automated signature generation? Writing alert signature for IDS isn’t fun Automation is good especially when there’s existence of unknown/unclassified attack Hence the automated signature is really helpful Isn’t false positive free though . . . Example Nebula for example, creates signature from honeytrap argos Muhammad Najmi myGOSSCON 2009, Malaysia
  42. myGOSSCON 2009, Malaysia Toying with binaries Nebula Signature alert for

    Conficker A and B The following alerts was created automatically by Nebula a l e r t tcp any any − > $HOME NET 445 (msg : ” c o n f i c k e r . a s h e l l c o d e ”; content : ”| e8 f f f f f f f f c1 |ˆ|8 d |N|10 80|1| c4 | Af |81|9 EPu| f5 ae c6 9d a0 |O|85 ea |O|84 c8 |O|84 d8 |O| c4 |O|9 c cc | IrX | c4 c4 c4 | , | ed c4 c4 c4 94|&<O8 | 9 2 | \ ; | d3 |WG|02 c3 | , | dc c4 c4 c4 f7 16 96 96|O|08 a2 03 c5 bc ea 9 5 | \ ; | b3 c0 96 96 95 92 9 6 | \ ; | f3 | \ ; | 2 4 | i | 95 92|QO|8 f f8 |O|88 c f bc c7 0 f f7 |2 I | d0 |w| c7 95 e4 |O| d6 c7 17 f7 04 05 04 c3 f6 c6 86|D| f e c4 b1 | 1 | f f 01 b0 c2 82 f f b5 dc b6 1b |O|95 e0 c7 17 cb | s | d0 b6 |O|85 d8 c7 07|O| c0 |T| c7 07 9a 9d 07 a4 | fN | b2 e2 |Dh|0 c b1 b6 a8 a9 ab aa c4 | ] | e7 99 1d ac b0 b0 b4 f e eb eb | ” ; s i d : 2000001; rev : 1 ; ) a l e r t tcp any any − > $HOME NET 445 (msg : ” c o n f i c k e r . b s h e l l c o d e ”; content : ”| e8 f f f f f f f f c2 | |8 d |O|10 80|1| c4 | Af |81|9MSu| f5 | 8 | ae c6 9d a0 |O|85 ea |O|84 c8 |O|84 d8 |O| c4 |O|9 c cc | I s e | c4 c4 c4 | , | ed c4 c4 c4 94|&<O8 | 9 2 | \ ; | d3 |WG|02 c3 | , | dc c4 c4 c4 f7 16 96 96|O|08 a2 03 c5 bc ea 9 5 | \ ; | b3 c0 96 96 95 92 9 6 | \ ; | f3 | \ ; | 2 4 | i |95 92|QO|8 f f8 |O|88 c f bc c7 0 f f7 |2 I | d0 |w| c7 95 e4 |O| d6 c7 17 cb c4 04 cb |{|04 05 04 c3 f6 c6 86|D| f e c4 b1 | 1 | f f 01 b0 c2 82 f f b5 dc b6 1 f |O|95 e0 c7 17 cb | s | d0 b6 |O|85 d8 c7 07|O| c0 |T| c7 07 9a 9d 07 a4 | fN | b2 e2 |Dh|0 c b1 b6 a8 a9 ab aa c4 | ] | e7 99 1d ac b0 b0 b4 f e eb eb | ” ; s i d : 2000002; rev : 1 ; ) Muhammad Najmi myGOSSCON 2009, Malaysia
  43. myGOSSCON 2009, Malaysia Conclusion Summary of everything . . .

    Muhammad Najmi myGOSSCON 2009, Malaysia