427 Botnet fm qxd


www.syngress.com/solutions



Download 6,98 Mb.
Pdf ko'rish
bet280/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   276   277   278   279   280   281   282   283   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com/solutions
and click on the 
“Ask the Author”
form. 
427_Botnet_09.qxd 1/8/07 4:45 PM Page 343


427_Botnet_09.qxd 1/8/07 4:45 PM Page 344


Using Sandbox
Tools for Botnets
Solutions in this chapter:

Describing CWSandbox

Examining a Sample Analysis Report

Interpreting an Analysis Report

Bot-Related Findings of Our Live Sandbox
Chapter 10
345
Summary
Solutions Fast Track
Frequently Asked Questions
427_Botnet_10.qxd 1/9/07 3:06 PM Page 345


Introduction
There are several ways to obtain information about botnets and in particular
the bot applications seen in the previous chapters, especially in Chapters 5
and 7. One approach to analyzing this kind of software and learning more
about its internals and the underlying communication method and infrastruc-
ture is to execute them in a so-called 
sandbox
.
Sandboxes are a common concept in computer security and are used to
execute program code that comes from unverified or untrusted sources. A
sandbox offers a monitored and controlled environment such that the
unknown software cannot do any harm to the real hosting computer system.
This can be achieved by blocking some critical operations but permitting
other operations while monitoring them. Alternatively, you could implement
a complete virtual environment where processor, memory, and the file system
are simulated and the real system is not accessible for the tested application. In
malware analysis, the main aspect of a sandbox normally is not to block
accesses to the system resources but to monitor those accesses. Usually a vir-
tual machine or some other mechanism is used, by which the system can be
brought back into a clean and uninfected initial state after an analysis run, so
the protection of the underlying system is not so important.This form of
analysis is called 
behavior analysis,
in contrast to 
code analysis
, where the pro-
gram instructions are examined with the help of a disassembler or a debugger.
There are several software tools that perform such behavior analysis by
executing a sample in some form of sandbox, which monitors the performed
actions and then creates an analysis report of these actions. One candidate is
the 
Norman SandBox,
which was developed by Norman ASA, a Norwegian
company that has specialized in data security. Norman simulates a whole
computer system and a connected network.The implementation details and a
description of the underlying technology can be found in the company’s
Sandbox Whitepaper.
1.
A live version of the sandbox is online at
http://sandbox.norman.no/live.html, where everyone can submit malware
samples and get an analysis report by e-mail.
Another product is 
TTAnalyze
, developed by Ulrich Bayer of Ikarus
Software GmbH, in cooperation with the Technical University of Vienna
.
TTAnalyze uses the PC emulator 
QEMU
to run a complete Windows oper-
ating system inside of it. In this emulated system, the technique of 
API

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   276   277   278   279   280   281   282   283   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish