《Computer Virus and Malicious Code-Principles, Technologies and Prevention》(fourth edition) Guide

本文详细介绍了恶意代码的特性,包括计算机病毒、蠕虫、特洛伊木马等类型,以及它们的传播方式和命名规则。此外,还探讨了Linux环境下的恶意代码和移动终端上的恶意软件。文章还阐述了防病毒策略和预防技术,如特征码扫描、行为监控和备份恢复。最后,提到了国家层面和单机用户层面的恶意代码控制策略。
摘要由CSDN通过智能技术生成

Chapter 1: An Overview of the Malicious Code

Characteristics of the malicious code:

Purpose, transmissible, and destructive

Types of malicious code:

  1. Common computer viruses
  2. worm
  3. Trojan horse

A complete Trojan horse system consists of the hardware part, the software part, and the connection part

  1. Rookit tool

A typical Rootkit includes the following:

Web sniffers, Trojan horse programs, hidden attacker directory and processes, log cleaning tools

  1. rascal software
  2. spyware-software that is installed in a computer without the user's knowledge and transmits information about the user's computer activities over the internet
  3. Malicious advertising
  4. logic bomb
  5. back door
  6. botnet
  7. phishing
  8. Malicious script
  9. spam
  10. ransomware
  11. Mobile terminal malicious code

Malicious code transmission route:

Floppy disk, optical disc, hard disk, Internet, wireless communication system

Malicious code naming rule:

Platform name. Family name.group name. Variant number

Recent trends in malicious code:

  1. networking
  2. specialization
  3. oversimplify
  4. diversify
  5. robotization
  6. Crime

Chapter II: Malicious code model and mechanism

computer model:

Random access computer model (Random Access Machine, RAM): 2 / 14 / 1946, ENIAC, which is unable to infect the virus

Random Access Stored Program Model (Random Access Stored Program Machine, RASPM): With all the features of the RAM, the program can modify itself and does not require indirect addressing

RASPM model with background storage (Random Access with Attached Background Storage, RASPM _ ABS):

With background storage (external storage)

Internet Worminth transmission model:

SIS, SI and SIR are three models commonly used in the model of infectious disease transmission. Where, S indicates the susceptible, I the infected, and R the removed. The specific explanation is given as follows:

The SIS model: The SIS model is a simple model of infectious diseases, in which susceptible people can be infected, and infected people can recover and become susceptible again. The model assumes that the total population is constant, namely without considering factors such as migration, and birth and death

SI model: The SI model is a relatively early infectious disease model, in which susceptible people can be infected, and infected people will not recover and become susceptible. The model similarly assumes that the total population number is constant

SIR model: The SIR model is the most classic model in the infectious disease model, in which the susceptible person can be infected, the infected person can recover and become the removed person, and the removed person will not be reinfected. The model similarly assumes that the total population number is constant

Theoretical model of malicious code prevention:

Fred Cohen "Four-models" theory:

Basic isolation model

Separate the model

Flow model

Restriction interpretation model

Traditional computer virus structure and mechanism:

Run sequence: reset-> Get API-> Infection file-> Return to host program

Computer virus main module:

  1. Guide module (stay in memory, steal system control and restore system function)
  2. Infection module
  3. Damage module
  4. Trigger module

 Guided virus:

The guide virus first infects the guide area of the floppy disk, and then spreads to the hard disk and infects the main guide record of the hard disk (Main Boot Record, MBR). Once the MBR is infected by the virus, the virus attempts to infect the floppy guide zone in the floppy drive. The virus is hidden in the first sector of the floppy disk, allowing it to go into memory before the system files are loaded into memory, allowing for full control of the operating system.

Chapter 3: Traditional computer viruses

A 16-bit executable virus:

COM format (maximum 64 KB, absolute binary image of 16-bit program, no relocation information, no need for relocation)

MZ format (COM development, contains 16-bit code, with file header, including file entry point, stack location, relocation table, etc., need to be relocated)

NE format (when Win3.X is added, keep MZ head, add NE head, including EXE, DLL, DRV, FON, etc., for runtime dynamic link)

The 32-bit executable virus:

PE format (Portable Executable, Portable performer, relocation-> Get API-> Infection File-> Return to Host Program)

Macro virus:

Infected only the document files, including:

Microsoft: Word,Excel,Access,Powerpoint,Project,Visio,

Inprise: Lotus Amipro

Others: AutoCAD, CorelDRAW, and PDF

Word Macro virus:

Self-replication and propagation through DOC documents and DOT templates

Macro virus features:

  1. Spread very fast
  2. Easy to make, many varieties
  3. The possibility of the damage is great
  4. Multiplatform cross-infection
  5. Regional issues
  6. Version of the problem

Typical macro virus:

Melissa (Melissa)

Taiwan NO.1B

O97M.Tristate.C

ILOVEYOU

Macro.Word97.Thus

Macro.Word97.Marker

Nuclear

Chapter IV: Linux Malicious Code Technologies

The first Linux malicious code: Bliss (The Blessing of Heaven, February 1997)

The first virus across the Windows and Linux platforms: W32.Winux (aka W32.Lindoes or W32.PEElf.2132)

Linux system Malicious Code Classification:

  1. The Shell Malicious script
  2. worm
  3. Based on the cheat library function malicious code
  4. Malicious code that is compatible with the platform

Shell Malicious script:

Here is a simple shell malicious script

for file in ./infect/* / / Traverse documents

do

cp $0 $file // self-duplication

d one

 ELF file format:

The executable link format (Executable and Linkable Format, ELF) is developed by the UNIX systems lab as an application binary interface.

The ELF format file infection principle:

  1. Infection methods in an irrelevant ELF format
  1.  Covered infection

Some viruses will force covering a part of the execution program, embedding their own code to achieve the purpose of not changing the length of the infected file. The code covered by such viruses cannot be recovered, so that the virus cannot be killed safely. The virus destroys something of the file and cannot restore the original file after killing the virus.

  1.  Additional infection

Different from the same coverage infection mode, the virus body is directly added to the host file, or after the host is added to the virus body, the host file is not overwritten, and the control is returned to the host file after the execution of the virus file.

  1. Infection infection infection the ELF format
  1. After the text segments fill in
  2. The data segment is inserted after the infection
  3. Text segment before inserted before infection
  4. Using functions to align the populated region for infection
  5. Use the NOTE segment or the extension.note jié
  1. Advanced infection technology
  1.  The LKM infection technique

LKM technology is the Linux Kernel Module Technology (Loadable Kernel Module), a technology that can dynamically insert or delete code into the Linux kernel at runtime. With LKM technology, you can add new functions to the kernel without recompiling the kernel to dynamically modify the Linux system. LKM technology can be used for driver development, system debugging, security protection and other aspects. Since LKM technology has the ability to dynamically modify the kernel, it may also be used by hackers to develop malware, such as Rootkit.

  1.  The PLT / GOT hijacking implementation

The PLT / GOT hijacking implementation technology is used to modify the global offset table (GOT) and the process link table (PLT) of the program to realize the control hijacking of the program. When the program runs, PLT / GOT hijacking implementation technology is often used in binary vulnerability exploitation, power extraction attack, malicious code injection and so on, which is a common technology in hacker attacks.

 Chapter 5: Trojan Horse (Trojan Horse Overview)

The Trojan horse is named after the means of war in Homer's Epic Iliad. In information security, the Trojan horse is a program that establishes a connection with the remote computer, which enables the remote computer to control the user computer system through the network and may cause the user's information damage, system damage and even paralysis.

The composition of the Trojan horse:

  1. Hardware part
  1. control end
  2. server
  3. Internet
  1. Software part
  1. Control end program
  2. Trojan program
  3. Trojan configuration program
  1. pontes
  1. Control side IP and server side IP
  2. Control terminal port and Trojan horse ports

Classic Trojan:

Back Orifice (BO), Netspy, Picture, Netbus, Asylum, glacier, grey pigeon, Internet thief

The characteristics of Trojan horse:

  1. fraudulence
  2. crypticity
  3. Automatic running
  4. Automatic recovery function
  5. The particularity of function

The classification of Trojan horse:

  1. Remote-controlled Trojan horse
  2. Send a password-type Trojan horse
  3. Keylogging Trojan
  4. Damaged Trojan horse
  5. FTP Trojan horse

 Similarities and differences between remote control software and Trojan horse:

Remote control software and Trojan horses are both tools used for remote control of computers, but there are some similarities and differences between them. Common points include: can control the computer remotely through the network, can perform malicious operations on the computer, such as stealing sensitive information, implanted back doors, etc. The differences include: the remote control software is usually legal and can be obtained through normal installation, while the Trojan is usually spread through potential vulnerabilities or social engineering means; the remote control software usually has clear functions and uses, while the Trojan is usually hidden with multiple malicious functions; the remote control software usually has clear users and users, while the Trojan can be used by anyone.

Technical development of Trojan horse:

  1. Cross-platform
  2. building block design
  3. Updated to the stronger infection patterns
  4. Instant notice
  5. Stronger and more features

Chapter 5 Trojan Horse (Key technology of Trojan Horse Program)

implantation technique:

  1. Commonly used implantation methods
  1. Email implantation
  2. IM disseminate
  3. Download transmission
  4. Vulnerability implantation
  5. Online neighbor implantation
  6. Web implantation
  1. First run
  1. Imposing as an image file
  2. Program bundling deception
  3. Z-file
  4. Masquerading as an application extension component
  1. Website hang horse technology
  1. Frame hanging horse
  2. Js hang horse
  3. Picture camouflage hanging horse
  4. Website fishing hanging horse
  5. Disguise hanging horse

Self-starter technology:

  1. Modify batch
  1. Autoexec. Bat (executed on boot system)
  2. Winstart. Bat (executed when starting the graphical interface)
  3. Dosstart. Bat (performed on entering the MS-DOS)
  1. Modify system configuration
  1. System.ini
  2. Win,ini
  1. With the help of the automatic play function
  2. Start it up by using a Run in the registry
  3. Started through a file association
  4. Started via the API HOOK
  5. Started via VxD
  6. Start it up by browsing the web page
  7. exploitation JavaApplet
  8. Proprogram that run automatically using the system
  9. Other methods

Hidden technology:

  1. Rebound Trojan horse technology (Internet god thief)
  2. Hide the connections with the ICMP method
  3. Hidden port
  4. Windows NT The Trojan horse process is hidden under the system
  5. Remote Threading Technology

Chapter 6: malicious code of mobile intelligent terminal

Common smartphone operating systems:

Android, IOS, Windows Phone, Symbian, Linux, WebOS, BlackBerry Systems

The weaknesses of the mobile phone operating system:

  1. Arbitrary access control is not supported (cannot distinguish the personal privacy data of different users)
  2. No audit capability
  3. Lack of ability to reuse control through identity identifiers or authentication
  4. Data integrity is not protected
  5. Even if some systems are password protected, malicious users can still use debug mode to easily get someone else's passwords, or by using simple tools like PalmCtypt
  6. With password lock cases, the mobile terminal operating system still allows the installation of new applications

Key technologies of mobile terminal malicious code:

  1. Mobile terminal malicious code transmission route
  1. Terminal-Terminal
  2. Terminal-gateway-terminal
  3. PC-terminal
  1. Mobile terminal malicious code attack mode
  1. SMS attack
  2. Attack your phone directly
  3. Attack the gateway
  4. Attack vulnerability
  5. Trojan-type malicious code
  1. Mobile terminal malicious code survival environment
  1. The system is relatively closed
  2. The creation space is narrow
  3. The data format is monotonous
  1. A vulnerability in mobile terminal devices
  1. The PDU format vulnerability
  2. Special character vulnerability
  3. vCard leak
  4. The '%String' vulnerability for the Siemens
  5. Android Browser vulnerability

Classic mobile terminal malicious code:

Cabir, CopyCat, Judy, X undercover series Trojan, white card suction fee magic Trojan, VBS. Timofonica, Swalmoney greedy ghost, Skulls, Lasco

Prevention of malicious code in mobile terminals:

  1. Pay attention to call information
  2. Careful network download
  3. Don't receive weird text messages
  4. Turn off the wireless connection
  5. Focus on security information

Chapter 7 Worms

Classification of worms:

  1. For enterprise users and LAN

Code Red, Nimda, SQL Worm King

  1. For individual users and the networks

Love bug, cover letter

Differences between worms and traditional viruses:

Existing form: worm (independent program), traditional virus (storage file)

Infectious mechanism: worm (active attack), traditional virus (host program run)

Infection object: worm (computer), traditional virus (local file)

 Composition of the worm viruses:

 Transmission module: It is responsible for finding the next target computer to meet the infection conditions, and copying itself to the target computer to achieve the transmission of the worm virus.

 Infection module: It infects the target computer and copies itself to the target computer to spread the worm.

 Control module: Responsible for the control of the infected computer for the remote control and operation of worm viruses.

Load module: responsible for performing malicious functions of worm viruses, such as stealing sensitive information, inserting back doors, etc.

Characteristics of shock net worms:

  1. The target is clear
  2. Adopt advanced technology

Characteristics of worms:

  1. Use the vulnerability to actively attack actively
  2. Combined with the hacking technology
  3. There are many ways to infect
  4. Spread fast
  5. It is difficult to remove
  6. Destructive

Classic worm:

Morris Worms, Code Red, Nemda, shock wave, Shock Wave, shock net, Cover Letter, Love Letter, Buworm

Chapter 8 Tailware-type malicious code

Exilware malicious code is a kind of malicious software for the purpose of extortion. It is a malicious attack means for hackers to hijack users' equipment or data assets and extort money from users on conditions

There are two forms of ransomware, namely data encryption and restricted access

Typical blackmailing of malicious code:

WannaCry、Hidden-Tear

WannaCry:

  1. The worm module
  2. Vulnerability utilization module (Eternal Blue vulnerability, 445 + 139 port, SMB service)
  3. The extortion module

Prevention and response strategies:

  1. Enhance safety awareness
  2. Backup important files
  3. Detection of network traffic
  4. Network isolation measures
  5. Updated software and installation patches

Emergency strategy: isolate the infected host, cut off the transmission route, find the attack source, kill the virus and repair the vulnerability

Chapter 9 Rogue software, mail-type malicious code, WebPage malicious code, botnet, Rootkit, APT

Rogue software features:

  1. Forced installation
  2. Unable to uninstall or uninstall difficult
  3. Interference with normal use
  4. Have malicious code and hacker characteristics

The propagation mode of the malicious code (email malicious code) using the Outlook vulnerability:

  1. Attachment method
  2. The mail itself
  3. Embedded way

Malicious code in the WebPage:

  1. Malicious script based on JavaScript
  2. Malicious script based on VBScript
  3. Malicious scripts based on PHP
  4. The Shell Malicious script

Typical WebPage malicious code (Wanhua Valley)

Features of the botnet (botnet):

  1. distributivity
  2. Malicious spread
  3. One-to-many control

The working process of botnet generally includes three stages: transmission, joining and control

Botnet communication means:

Instant messaging software, mail type malicious code, active attack vulnerabilities, malicious website scripts, Trojan horse

The Hazards of botnets:

  1. DDoS
  2. Send spam
  3. Steal the secret
  4. Abuse of resources

 Rootkit Concept of:

Rootkit Is a special kind of malicious software. Its function is to hide itself and the specified files, processes and network links on the installation target, so that the attacker can secretly spy on sensitive information and implant back doors on the target computer. Rootkit is characterized by concealment, persistence and advanced functions. It can hide its presence without detecting by conventional antivirus software and system tools; it can run automatically when the system starts to ensure its persistence; it can have advanced functions such as modifying the system kernel, tampering with system logs, and bypassing security protection. Rootkit Generally and Trojan, backdoor and other malicious programs in combination to achieve a more hidden and effective attack effect.

Rootkit Composition of:

  1. Network sniffing program
  2. The Trojan horse program
  3. A program to hide the attacker's directory and processes
  4. Log cleanup tool
  5. FIX order ... And other tools

Advanced Persistent Threat (Advanced Persistent Threat, APT):

Attack process of the APT:

The first stage is directed to information collection

The second stage of the single-point attack breakthrough

The third stage, build the channel

The fourth stage, lateral penetration

The fifth stage, the target action

Characteristics of the APT:

  1. Advanced sex
  1. Advanced means of collection
  2. Threat advanced data
  3. Advanced attack techniques
  1. constancy
  1. Continuous latent
  2. Continuous attack
  3. Continue to cheat
  4. Continuous control

Chapter 10: Malicious code prevention technology

Malicious code detection technology:

  1. Feature code scanning technique
  2. Heuristic scanning technique
  3. Integrity analysis technique
  4. Semantics-based detection techniques
  5. Behavior monitoring and analysis technology
  6. Code simulation and analysis technology

Malicious code detection method:

  1. Manual detection
  2. sense

Core components of automatic Test Procedure:

  1. condition code

 The feature code should not contain the malicious code data area, the data area is often changed.

 The code is sufficient to distinguish malicious code from other malicious code and other variants of that malicious code.

 Under the premise of maintaining the uniqueness, the feature code length should be made as short as possible to reduce the time and space overhead.

The signature code must be able to distinguish malicious code from normal programs.

  1. Scan engine

Data backup and data recovery:

Storage and backup technology:

  1.  Full backup

Comprehensive backup of all files specified by the entire system or by the user.

  1. incremental backup

Only back up newly created or updated data since the last backup operation.

  1.  Differential backup

Backup all the data generated and updated after the last full backup.

Chapter 11 Common antivirus software and solutions

Antivirus software selection reference:

  1. The ability to kill
  2. Ability to guard against new malicious code
  3. Backup and recovery capabilities
  4. Real-time monitoring capability
  5. Upgrade ability
  6. Intelligent installation capability
  7. Simple and easy to use
  8. Resource occupation
  9. compatibility
  10. price
  11. The strength of the manufacturer

The geography of malicious code prevention products: the living space of the author, the specific operating system and software environment, targeted attacks and conditional transmission

Chapter 12 Malicious code control strategy

Basic principles for malicious code control strategy:

  1. Refuse access
  2. detectability
  3. The ability to control the transmission
  4. Clear ability
  5. recovery capability
  6. Alternative operation

National-level prevention and control strategies:

  1. Improve relevant laws and regulations and their implementation
  2. Establish a malicious code early warning system in each backbone network
  3. Establish a multi-level malicious code emergency response system
  4. Establish a dynamic systematic risk assessment measures
  5. Establish a malicious code accident analysis system
  6. Develop a complete backup and recovery plan
  7. Improve the security of domestic operators themselves
  8. Strengthen information security training
  9. Strengthen technical preventive measures

Single-machine user prevention and control strategy:

  1. The newly purchased computer immediately upgrades the system to ensure that all known security vulnerabilities are repaired
  2. Use a high-intensity password
  3. Install the system patch in time
  4. Important data should be backed up
  5. Select and install the security prevention software certified by the authority
  6. Use a network firewall
  7. Do not access the Internet, or disconnect, when the network is not needed
  8. Set up the mail automatic antivirus function of the antivirus software
  9. Correct configuration of malicious code prevention products, give play to the technical characteristics of the products
  10. Make full use of the security mechanism provided by the system, correctly configure the system, and reduce malicious code intrusion events
  11. Regularly check sensitive documents to ensure timely detection of infected malicious code and hacking programs

sundry:

"Network Security Law of the People's Republic of China" effective time 6 / 1 / 2017.

 Article 286 of the Criminal Law stipulates that anyone who intentionally makes or spreads a computer virus with serious consequences shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention, and if the consequences are especially serious, he shall be sentenced to fixed-term imprisonment of not less than five years.

In the late 1990s, China's Ministry of Public Security launched China's earliest anti-virus software Kill 6.0.

Citations:

《Computer Virus and Malicious Code-Principles, Technologies and Prevention》(fourth edition)

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值