Lecture 8 Coveringtracks
Lecture 8 Coveringtracks
vulnerabilities
and penetration
testing
Dr Phillip James
Where are we? Reconnaissance Scanning
response
Rootkits are good, especially kernel level:
Example: On Windows:
hiding network Use the Internet Explorer COM object to communicate via
HTTP through the IEXPLORE process.
In code:
Example:
How do you delete a picture on windows?
a thumbnail of this picture should still exist in:
%userprofile%\AppData\Local\Microsoft\Windows\Explorer
Binders
Combine malicious code with another binary to create a new
binary. The signature of the malicious code is modified.
Example: updated when you open a file or when a file is used for other
timestamps access
operations like grep, cat, head and so on.
updated when you whenever update content of a file or save a
modify
stat that file.
file.
updated when the file attributes are changed, like changing the
change
owner, but will also be updated when you modify a file.
Examaple:
stuff.txt > hiddenstuff.txt:malicious.txt
That's it.
notepad hiddenstuff.txt:malicious.txt
Timestomp is a Meterpreter plug-in that allows you
to modify, erase, or set certain attributes on files.
Timestomp
A simple way of changing file access and modifies times.
Specify times:
touch -t [[CC]YY]MMDDhhmm[.SS] file.txt
clearlogs.exe –sec
Simple program to do the same as above.
Don't forget to remove clearlogs.exe!
Linux rm –rf!
Easy right?
…but do you really want to delete everything?
Shell command history is stored in ~/.bash_history
Don’t log my The size of our history file is determined by the environment
shell (*nix) variable HISTSIZE.
Example:
Lab: Hiding.