427 Botnet fm qxd


TNotification_ProtectedStorage



Download 6,98 Mb.
Pdf ko'rish
bet286/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   282   283   284   285   286   287   288   289   ...   387
Bog'liq
Botnets - The killer web applications

TNotification_ProtectedStorage
Used for API calls that perform
accesses on the Protected Storage, which is a Window Service for
storing authentication data of applications or Web sites

TNotification_Registry
Used for API calls that access the registry

TNotification_Service
Used for API calls that access Windows
Services

TNotification_System
Used for API calls that perform system func-
tions, such as rebooting the system
www.syngress.com
Using Sandbox Tools for Botnets • Chapter 10
353
427_Botnet_10.qxd 1/9/07 3:06 PM Page 353



TNotification_SystemInfo
Used for API calls that query system
information, such as querying the current user

TNotification_Thread
Used for API calls that perform actions on
threads, such as creating or terminating

TNotification_User
Used for API calls that use the Windows built-in
user management functions, such as creating or deleting a user

TNotification_VirtualMemory
Used for API calls that access another
process’s virtual memory

TNotification_Window
Used for API calls that access the currently
existing windows, such as to find a window with a given title or class
name

TNotification_WinSock
Used for API calls that perform WinSock
operations
There is a focus on analyzing the network connections and the traffic
data. For that reason the transferred data is inspected and an attempt is made
to determine the underlying Web protocol. At the moment, the following
protocols are understood: Hypertext Transport Protocol (HTTP), File Transfer
Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Internet Relay Chat
Protocol (IRC), and the Ident Protocol (IDENT). Connections that use
RFC-conform messages and slightly modified versions of them are automati-
cally detected, and all the protocol-dependent data, such as the login informa-
tion, downloaded Web sites, or performed FTP commands, is extracted. If an
SMTP connection is detected, the CWSandbox can be instructed to trick the
malware such that only informational requests are sent to the remote SMTP
server instead of real mail delivery.That way, the malware thinks it is working
with a proper SMTP server. All the information about outgoing e-mail can
be monitored, whereas no actual e-mail is sent at all.
Cwsandbox.exe
The 
cwsandbox.exe
is a noninteractive console application; it expects, and
needs, no user input during its execution.The only possible input is 

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   282   283   284   285   286   287   288   289   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish