This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment
The purpose of this chapter is to discuss the present most common web application vulnerabilities, according to OWASP, and show through several scenarios how they can be exploited by malicious users. We present a brief description of each vulnerability and give its root causes, in order to help the reader understand why it happens. Considering that security and functional tests are fundamentally different, we describe what to look for when searching for web application weaknesses. Since the best approach in security is to be proactive, we provide a list of controls that should be in place to avoid those problems in the first place.
ResumoO objetivo deste capítulo é apresentar as vulnerabilidades mais comuns que afetam aplicações web, de acordo com o OWASP, e mostrar, por meio de diversos cenários, como elas podem ser exploradas por usuários maliciosos. Uma breve descrição de cada vulnerabilidade é apresentada, juntamente com as causas principais, para que o leitor compreenda porque elas ocorrem. Considerando que testes funcionais e de segurança são fundamentalmente diferentes, descreve-se o que procurar durante o processo de detecção de fraquezas nessas aplicações. Finalmente, como a melhor abordagem para segurança é ser pró-ativo, uma lista de controles para evitar a presença dessas vulnerabilidades é fornecida.
Self-checking algorithms are used to ensure a software executes as intended. This guarantee is important not only to protect software against piracy, but also in order to avoid third parties to illegally modify it and introduce malicious code with the purpose of infecting users. In this paper, we present the implementation aspects of a self-checking algorithm for Adobe Flash Applications
Current implementations of intrusion detection systems (IDSs) have two drawbacks: 1) they normally generate far too many false positives, overloading human operators to such an extent that they can not respond effectively to the real alerts; 2) depending on the proportion of genuine attacks within the total network traffic, an IDS may never be effective. One approach to overcoming these obstacles is to correlate information from a wide variety of networks sensors, not just IDSs, in order to obtain a more complete picture on which to base decisions as to whether alerted events represent malicious activity or not. The challenge in such an analysis is the generation of the correlation rules that are to be used. At present, creating these rules is a time consuming manual task that requires expert knowledge. This work describes how data mining, specifically the k-means clustering technique, can be employed to assist in the semi-automatic generation of such correlation rules.
This paper presents and explains cryptanalytic and reverse engineering techniques, that were employed to recover, from a set of encrypted files, the original information two different malwares stole from a big Brazilian company as part of directed attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.