电脑攻击与防御 The Attack and Defense of ComputersDr. 许.ppt
《电脑攻击与防御 The Attack and Defense of ComputersDr. 许.ppt》由会员分享,可在线阅读,更多相关《电脑攻击与防御 The Attack and Defense of ComputersDr. 许.ppt(158页珍藏版)》请在麦多课文档分享上搜索。
1、1,電腦攻擊與防禦 The Attack and Defense of ComputersDr. 許 富 皓,2,Rootkit,3,for Windows by Bryce Cogswell et al. ,4,Categories of Rootkits Windows,User-mode Rootkits Kernel-mode Rootkits,5,User-mode Rootkits,6,Windows API wikipedia,The Windows API, informally WinAPI, is the name given by Microsoft to the cor
2、e set of application programming interfaces available in the Microsoft Windows operating systems. It is designed for use by C/C+ programs and is the most direct way to interact with a Windows system for software applications.,7,Windows API developerfusion,Windows can do lots of things: manage hardwa
3、re run programs display iconsMuch of these functions are carried out by DLL files. DLLs (Dynamic Linked Libraries) store functions, so other programs can access them. The advantage of using DLLs is that the same file can be accessed at the same time by different programs. The functions stored in the
4、 windows DLLs are called Windows API.,8,Native APIwikipedia,The Native API (with capitalized N) is the publicly incompletely documented application programming interface used internally by the Windows NT family of operating systems. Most of the Native API calls are implemented in ntoskrnl.exe and ar
5、e exposed to user mode by ntdll.dll. Some Native API calls are implemented in user mode directly within ntdll.dll. While most of Microsoft Windows is implemented using the documented and well-defined Windows API, a few components, such as the Client/Server Runtime Subsystem are implemented using the
6、 Native API, as they are started early enough in the Windows NT Startup Process that the Windows API is not available yet.,9,Windows Library Files - user32.dll ,user32.dll is a file that contains Windows API functions related the Windows user interface, such as: Window handling basic UI functions an
7、d so forth. It is a core file for several versions of the Microsoft Windows operating system. If this file is damaged or deleted, the operating system will not work.,10,Native Applications answer,Applications that are linked directly against a Native API library are known as Native Applications the
8、primary reason for their existence is to perform low-level tasks such as direct disk I/O that cannot be achieved through the documented Windows API. Ordinary Windows applications are not linked directly against a Native API library, but to one or more of the WinAPI libraries with well-documented API
9、s This is to retain portability across Windows Platforms among other reasons.,11,User-mode Rootkits Utilizing Windows APIs,A user-mode rootkit might intercept all calls to the Windows FindFirstFile/FindNextFile APIs. These two APIs are used by file system exploration utilities, including Explorer an
10、d the command prompt, to enumerate the contents of file system directories. When an application performs a directory listing that would otherwise return results that contain entries identifying the files associated with the rootkit, the rootkit intercepts and modifies the output to remove the entrie
11、s.,12,API Hooking craigheffner,In Windows, all applications must communicate with the kernel through API functions; as such, these functions are critical to even the simplest Windows application. Thus, the ability to intercept monitorand modifya programs API calls, commonly called API hooking, effec
12、tively gives one full control over that process.,13,Usage of API Hooking craigheffner,API Hooking can be useful for a multitude of reasons, including debugging reverse engineeringand hacking.,14,Intercept API Calls,While there are several methods which can be used to intercept monitorand modifya pro
13、grams API calls, one of them is DLL redirection.,15,DLL Redirection craigheffner,Since an executable imports API functions from DLL files, DLL redirection allows us to tell a program that the DLLs it needs are located in a different directory than the originals.In this way we can create a DLL with t
14、he same name as the original, which exports the same function names as the original, but each function may contain whatever code we like.,16,User-mode Rootkits Utilizing Windows Native APIs,More sophisticated user-mode rootkits intercept file system registryand process enumeration functions of the N
15、ative API.This prevents their detection by scanners that compare the results of a Windows API enumeration with that returned by a Native API enumeration.,17,Registry Microsoft,A central hierarchical database used in Microsoft Windows 9x Windows CE Windows NTand Windows 2000used to store information
16、necessary to configure the system for one or more users applications hardware devices.Registry data is stored in binary files.,18,Information Contained in the Registry Microsoft,The Registry contains information that Windows continually references during operation, such as profiles for each user the
17、 applications installed on the computer the types of documents that each application can create property sheet settings for folders and application icons what hardware exists on the system the ports that are being used.,19,Description of the Registry Microsoft,The Registry replaces most of the text-
18、based .ini files used in Windows 3.x and MS-DOS configuration files, such as the Autoexec.bat and Config.sys. Although the Registry is common to several Windows operating systems, there are some differences among them.,20,What Does the Registry Look Like - Tim Smith ?,The Registry is stored on your
19、hard disk in several files but the only way to look at it and make changes is to use the regedit program. To access this, click on the Start Button and then on the Run option. Type regedit into the box that appears and press Enter. This will launch regedit and you will now have your first sight of t
20、he Registry.,21,Organization of Registry Tim Smith,The Registry is organized much like the files on a disk and will look familiar if you have ever used the Folders view in Windows Explorer. In the Registry, however, these folders are called keys. To open a key, simply click on the small plus (+) sym
21、bol next to it. You will then see that each key contains either more keys - called subkeysor values.,22,Key Overview Tim Smith,The keys are organized logically but there are thousands of them, which can be daunting the first time you sneak a peek at the Registry. To simplify things, be aware that th
22、ere are five root keys and these are the basic building blocks of the Registry.,23,Predefined Keys Microsoft,What follows is the predefined keys that are used by the system. HKEY_CURRENT_USER (abbr. HKCU) HKEY_USERS (abbr. HKU) HKEY_LOCAL_MACHINE (abbr. HKLM) HKEY_CLASSES_ROOT (abbr. HKCR) HKEY_CURR
23、ENT_CONFIG (abbr. HKCC) The maximum size of a key name is 255 characters.,24,Key Value wikipedia,Each of the predefined keys is divided into subkeys, which may contain further subkeys, and so on. Any key may contain values. These values can be: String Value Binary Value (0 and 1s) DWORD Value, a 32
24、bit unsigned integer (numbers between 0 and 4,294,967,295 232 1) Multi-String value Expandable String Value,25,Key Hierarchy wikipedia,Each key has a default value, which is in effect a value with the same name as the key. Registry keys and values are specified with a syntax similar to Windows filen
25、ames, using backslashes to indicate levels of hierarchy. e.g. HKEY_LOCAL_MACHINESoftwareMicrosoftWindows refers to the subkey “Windows“ of the subkey “Microsoft“ of the subkey “Software“ of the HKEY_LOCAL_MACHINE key.,26,Example (1),HKCU has subkeys and values. By pressing the + before the HKCU you
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电脑 攻击 防御 THEATTACKANDDEFENSEOFCOMPUTERSDR PPT

链接地址:http://www.mydoc123.com/p-380023.html