427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet317/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   313   314   315   316   317   318   319   320   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
386
Chapter 10 • Using Sandbox Tools for Botnets
427_Botnet_10.qxd 1/9/07 3:06 PM Page 386



Querying the DNS server for address resolution

Sending and receiving UDP data

Connecting via TCP to a remote host

Setting up a TCP server for accepting connections

Accepting incoming TCP connections

For recognized application protocols, the used protocol-dependent
data is displayed, such as username, password, nickname, mail receiver,
mail content, and performed FTP commands
It has turned out that the use of CWSandbox for automatic behavior
analysis brings a big benefit in malware research. Nevertheless, though the
received analysis results normally are very comprehensive and detailed, one
has to be aware that there is never an assurance of their completeness. First,
because a sandbox usually monitors only one single execution path of an
application, only the actions that are performed on this path can be reported.
There is no guarantee that there are no other malicious operations that are
only triggered under certain conditions which were not met during the anal-
ysis run. Second, there are many tricks to either detect a sandbox or to per-
form operations in a way the sandbox is not able to track. Accordingly, the
sandbox is a great research tool, but you should not rely completely or solely
on it.Think of it as one more tool in a defense-in-depth strategy.
Solutions Fast Track
Describing CWSandbox
Sandboxes are a common tool in security/malware research; they
allow the execution of unknown software in a controlled, restricted,
and monitored environment.
CWSandbox is a tool for automatic behavior analysis of Windows
executables.The following steps are performed:

The initial malware process is created by the starter application,
cwsandbox.exe.

Cwmonitor.dll is injected into each monitored process.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   313   314   315   316   317   318   319   320   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish