2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web (

Similar documents
2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for

<4D F736F F F696E74202D E9197BF C A837B C EC091D492B28DB8284E E B8CDD8AB B83685D>


オンラインによる 「電子申告・納税等開始(変更等)届出書」 提出方法

29 jjencode JavaScript

Microsoft PowerPoint - MWS意見交換会-D3M2013.pptx

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

SOC Report

Drive-by Download RIG Exploit Kit

山梨県ホームページ作成ガイドライン

IT活用事例解説書

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar

MWS 2014 意見交換会 D3M (Drive-by Download Data by Marionette) 2014

Installation and New Features Guide for FileMaker Pro and FileMaker Pro Advanced

08+11Extra

InterSafe Personal_v2.3 ユーザーズガイド_初版

NetIQ White Paper

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

Flash Player ローカル設定マネージャー

GTSC Security Response Team Microsoft Asia Limited ( ) 2

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

untitled

ACDSee-Press-Release_0524

Vol. 44 No. SIG 12(TOD 19) Sep MF MF MF Content Protection Mechanism Based on Media Framework and an Implementation for Autonomous Information C

I

SQLインジェクション・ワームに関する現状と推奨する対策案

2.3 1 RIG Exploit Kit (4) 4 Exploit Kit 2.2 RIG Exploit Kit RIG Exploit Kit 1 5 (1) Web Web (2) RIG Exploit Kit URL (3) URL iframe RIG Exploit Kit (4)

untitled

Windows Macintosh 18 Java Windows 21 Java Macintosh

08encode part 2

Vol.55 No (May 2014) MS 1,a) 2,b) , MS Rich Text Compound File Binary MS MS MS 98.5% MS Rich Text CFB MS Methods to D

今企業が取るべきセキュリティ対策とは策

1 Web 1W e b Q Pay-easy 2 31 Web :00 315:00 15:00 315:00 Q 515:00 Q 9 30 Q :00 6:00 21:00 6:

HTML Flash Alt 2

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

操作1 <設問作成>

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

Web STEPS Web Web Form Cookie HTTP STEPS Web

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

bit : データの最小単位 1bit = 最小状態の単位 二進一桁 = 配線一本 Byte バイト 8bits 0-255まで アルファベットは 1 バイト 256 文字以下 漢字は 普通は 2 バイト 文字以下 2

タイトルを1~2行で入力 (長文の場合はフォントサイズを縮小)

2

1 : Google Amazon Facebook Akamai Hyper giants Web [1] Web Web Web Magnitude Exploit Kit PHP.net Web Yahoo 600 [2] Web URL Blacklist URL Blacklist URL

2011 Heuristics for Detecting Malware Attacks 0BDRM018

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Drive-by Download 攻撃に おけるRIG Exploit Kitの 解析回避手法の調査


& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

Web Web Web Web Web, i

untitled

★保健医療科学_第67巻第2号.indb

SQL Web Web SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL SQL i

インターネット利用ソリューション

ohp.mgp

GPGPU

XML ( ) XML XML jedit XML XPath XSLT jedit JAVA VM jedit Slava Pestov GNU GPL ( ) jedit jedit ( jedit XML jed

Web Web Web Web Web IP

ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

SOC Report

25 About what prevent spoofing of misusing a session information

FileMaker Server Getting Started Guide

Installation and New Features Guide for FileMaker Pro and FileMaker Pro Advanced

AlertCon SOC SOC IBM X-Force SOC SOC

MWSCup2013事前課題1解答例

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

ガイドブック

FileMaker Server Getting Started Guide

82801pdf.pqxp

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

ICT Web Web ICT Web 2. 新 学 習 指 導 要 領 の 理 念 と 教 育 の 情 報 化 の 意 義 2-1 新 学 習 指 導 要 領 の 理 念 ICT 2

Installation and New Features Guide for FileMaker Pro 10 and FileMaker Pro 10 Advanced

FileMaker Server 9 Getting Started Guide

Player, Microsoft Internet Explorer など 様々存在している. 特に Flash Player には 2014 年から 2015 年 8 月 24 日までに 242 件もの脆弱性が発見されており [2], 攻撃者に狙わ れやすいソフトウェアのひとつとなっている. D

CONTENTS Web

1 はじめに 2009 年に発生した Gumblar[22] による大規模攻撃を皮切りに, ドライブ バイ ダウンロード攻撃 (DBD 攻撃 ) による被害が後を絶たない. ここ数か月においても, 正規の Web サイトが改ざんの被害を受け, ドライブ バイ ダウンロード攻撃に悪用される事例が多発し

IPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo

PowerPoint Presentation

MOMW_I_,II 利用ガイド.PDF

ト情報を漏えいする機能を保有している [2]. このため, 感染端末上に Web サイト管理者用の FTP アカウント情報が記憶されている場合 は, その情報が攻撃者に漏えいしてしまい, 新たな Web サイト改ざんを引き起こす [3]. このように,Web サイト改ざんと FTP アカウント情報漏

CSV ToDo ToDo

FileMaker Instant Web Publishing Guide

CERI NEWS




untitled

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IP IP DHCP..


e-learning e e e e e-learning 2 Web e-leaning e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware

ウイルスバスター2012 クラウド ガイドブック

U

情報セキュリティの現状と課題


fiš„v5.dvi

FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi

Transcription:

NTT 3-9-11 {akiyama.mitsuaki,iwamura.makoto,kawakoya.yuhei, aoki.kazufumi,itoh.mitsutaka}@lab.ntt.co.jp Web drive-by-download web drive-by-download web web Implementation and Evaluation of Detection Methods on Client Honeypot Mitsuaki Akiyama Makoto Iwamura Yuhei Kawakoya Kazufumi Aoki Mitsutaka Itoh NTT Information Sharing Platform Laboratories Midori-Cho 3-9-11, Musashino, Tokyo 180-8585 Japan {akiyama.mitsuaki,iwamura.makoto,kawakoya.yuhei, aoki.kazufumi,itoh.mitsutaka}@lab.ntt.co.jp Abstract Countermeasures against malicious web sites are urgently needed because of increasing the number of incidents that vulnerable web browsers are infected malware by driveby-download attacks. We proposed detection methods of drive-by-download attack for client honeypot system. Proposed methods focused on the behavior of web browser in the view points of exploitation phases: 1) preparation of exploitation, 2) the moment of exploitation and 3) behavior of after exploitation. By combining proposed methods, our client honeypot improved detection coverage without increasing false-positives. 1 FW BB ISP OS E Web 2009 4 JSRedir-R[8] Web Web drive-by-download Web [9] Web Web [1][14][15][16] Web Web

2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web ( 1) Web Web exploit web buffer-overflow shellcode Shellcode HeapSpray 2 HeapSpray JavaScript VBscript shellcode web NOP shellcode web MB MB <script> 標的ホスト mem = new Array();... for(i=0,i<n;i++){ mem[i] = SlideCode + Shellcode; }... </script> 1. 悪性 webサイトへアクセス 1 2. Web ブラウザに対する攻撃と乗っ取り 3. 自動的にマルウェアのダウンロードとインストール Exploit コードが含まれる web コンテンツ マルウェア 1: Drive-by-download HeapSpray script 1. The script injects vast amount of strings.. 悪性 web サイト 2. Buffer overflow is caused.. 3. Instruction pointer Browser s heap memory points somewhere on heap mem. 4. Shellcode is running. 2: HeapSpray exploit shellcode MDAC(Microsoft Data Access Componet) (MS06-014) HeapSrapy shellcode 4 JavaScript VBscript web HeapSpray web web 1. HeapSpray

2. 3. Windows Windows XP SP2 Internet Explorer 6.0 Internet Explorer MPack[10] WinZip 10.0 QuicTime 6.5.2 Acrobat Reader 8.1 Flash Player 9.45 4.1 HeapSpray HeapSpray JavaScript VBscript jscript.dll vbscript.dll oleaut32.dll SysAllocStringByteLen() API API API hook jscript.dll vbscript.dll API HeapSpray HeapSpray HeapSpray API API 4.2 HoneyPatch[17] HoneyPatch 1: HoneyPatch Web MS06-001 MS06-014 WMF MDAC MS06-055 VML (Internet MS06-057 WVFIcon Explorer) MS07-004 VML MS07-017 ANI CVE-2008-0015 Video Contorl CVE-2006-5198 WinZip CVE-2007-0015 QuickTime CVE-2007-3456 Flash Player CVE-2007-5659 Acrobat Reader CVE-2008-2992 Acrobat Reader CVE-2009-0658 Acrobat Reader CVE-2009-0927 Acrobat Reader shellcode Web MPack Internet Explorer exploit Acrobat Reader [8] Internet Explorer 6.0 15 HoneyPatch 1 3rd [3][6][13] 4.3 API Internet Explorer C:\\WINDOWS\SYSTEM32 API hook API

web PDF web Acrobat Reader AcroRd32.exe AcroRd32.exe Capture-HPC HoneyClient web 5 MPack web PoC [4] web Malware Domain List[2]MDL 32446URL 2009 8 21 2009 8 21 23 MDL URL drive-by-download MDAC 5.1 3 web exploit 500KB 4MB 90MB 230MB web 3 HeapSpray Heap alloction summary (Byte) 1e+10 1e+09 1e+08 1e+07 1e+06 100000 10000 1000 100 MPack, PoC Web contents (MDL) 50MB HeapSpray 10 1 10 100 1000 10000 100000 1e+06 1e+07 1e+08 Max heap block size (Byte) 3: Web Exploit 50MB HeapSpray HeapSpray Shellcode shellcode exploit 50MB HeapSpray 5.2 1 web MDL HoneyPatch 2

2: MDAC MDAC MS06-001 0 (0%) 0 (0%) MS06-014 0 (0%) 171 (63.8%) MS06-055 4 (3.6%) 2 (0.7%) MS06-057 16 (14.5%) 17 (6.3%) MS07-004 6 (5.4%) 1 (0.3%) MS07-017 5(4.5%) 0 (0%) CVE-2008-0015 66 (60.0%) 67 (25.0%) CVE-2006-5198 1 (0.9%) 1 (0.3%) CVE-2007-0015 0 (0%) 0 (0%) CVE-2007-3456 0 (0%) 0 (0%) CVE-2007-5659 3 (2.7%) 4 (1.4%) CVE-2008-2992 8 (7.2%) 4 (1.4%) CVE-2009-0658 0 (0%) 0 (0%) CVE-2009-0927 1 (0.9%) 1 (0.3%) ( ) 110 268 MDAC MS06-014 CVE-2008-0015 exploit MDAC HoneyPatch web HoneyPatch HeapSpray 5.3 HeapSpray shellcode MDAC MS06-014 5.4 web 3 HeapSpray 3: HeapSpray Yes A B No C D Yes E F No G H 4: HeapSpray HoneyPatch A B - C - D - - E - F - - G - - H - - - 5: MDAC MDAC HeapSpray 161 (77.7%) 159 (63.8%) HoneyPatch 104 (50.2%) 179 (71.8%) 61 (29.4%) 198 (79.5%) (URL ) 207 249 8 HoneyPatch 4 B HeapSpray 5 MDL 6 MDL MDAC ( B D F) 68.4% 22.4% ( E G) 20.2% 11.6% MDAC MDAC MS06-014

6: MDAC MDAC A 17 (8.2%) 110 (44.1%) B 79 (38.1%) 7 (2.8%) C 6 (2.8%) 54 (21.6%) D 2 (0.9%) 8 (3.2%) E 4 (1.9%) 1 (0.4%) F 61 (29.4%) 41 (16.4%) G H 38 (18.3%) - 28 (11.2%) - (URL ) 207 249 79.5% MDAC 29.4% HeapSpray HoneyPatch F exploit HeapSpray ActiveX Control 6 Web drive-bydownload [1] M. Akiyama, Y. Kawakoya, M. Iwamura, K. Aoki, and M. Itoh. MARIONETTE: Client honeypot for Investigating and Understanding Web-based Malware infection on Implicated Websites. In Joint Workshot on Information Security, 2009. [2] Malware domain List. http: //malwaredomainlist.com/. [3] Microsoft. Security research & defense. http: //blos.technet.com/srd/. [4] Milw0rm. Remote browser vuln exploitation. http://milworm0rm. [5] MITRE. Honeyclient project. http://www. honeyclient.org/. [6] National Institute of Standards and Technology. National vulnerability database. http: //nvd.nist.gov/. [7] N. Provos. Spybye. http://www.provos. org/index.php?/categories/1-spybye. [8] Sophos. Malicious jsredire-r script found to be biggest malware threat on the web. http: //www.sophos.com/blogs/gc/. [9] Symantec. Global internet threat report volume xiv. http://www.symantec. com/business/theme.jsp?themeid= threatreport. [10] Symantec. Mpack, packed full of badness. http://www.symantec.com/enterprise/ security response/weblog/2007/05/ mpack packed full of badness.html. [11] The Client Honeynet Project. Capure- HPC. https://projects.honeynet.org/ capture-hpc. [12] The Client Honeynet Project. HoneyC. https://projects.honeynet.org/honeyc. [13] Zeroday Emergency Response Team (ZERT). Released patches. http://www.isotf.org/ zert. [14],,, and. web. In (CSS), 2008. [15],,,,, and.., 50(9), 2009. [16],,,, and. web. In (ICSS), 5 2009. [17],,, and. Honeypatch: Honeypot. In 2006, 2006.