SlideShare a Scribd company logo
OWASP IL, June 2015
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
waza
1234/
des_cbc_md5 f8fd987fa7153185
LSASS (kerberos)
rc4_hmac_nt
(NTLM/md4)
cc36cf7a8514893e
fccd332446158b1a
aes128_hmac
8451bb37aa6d7ce3
d2a5c2d24d317af3
aes256_hmac
1a7ddce7264573ae1
f498ff41614cc7800
1cbf6e3142857cce2
566ce74a7f25b
KDC
KDC
TGT
TGS
③ TGS-REQ (Server)
④ TGS-REP
⑤ Usage
User
Server
• RC4-HMAC don’t have any!
• RC4-HMAC don’t have any!
KDC
waza
1234/
User1
des_cbc_md5 f8fd987fa7153185
LSASS (kerberos)
rc4_hmac_nt
(NTLM/md4)
cc36cf7a8514893e
fccd332446158b1a
aes128_hmac
8451bb37aa6d7ce3
d2a5c2d24d317af3
aes256_hmac
1a7ddce7264573ae1
f498ff41614cc7800
1cbf6e3142857cce2
566ce74a7f25b
user rc4_hmac
_nt
aes256_
hmac
Joe 21321… 543..
user1 cc36cf7a
…
1a7ddc
…
Doe
TGT
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
KDC
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Check if newer keys exists
Locate newer keys
Patch newer keys
Acess lsass.exe memory
Locate functions (to re-route)
Inject patched functionsRe-route Init function
Re-route Decrypt function
KDC
User1
des_cbc_md5
LSASS (kerberos)
rc4_hmac_nt
(NTLM/md4)
aes128_hmac
aes256_hmac
user rc4_hmac
_nt
aes256_
hmac
Joe 21321… 543..
user1 cc36cf7a
…
1a7ddc
…
TGT
ff687678....
Skeleton
ff687678…
Skeleton key malware detection owasp
Automatically…
• Learn entities and their context
• Profile entity activities and behaviors
• Build the entities interaction graph
• Identify suspicious activities
• Connect suspicious activities into an Attack Timeline™
How Microsoft ATA works
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
Skeleton key malware detection owasp
https://gallery.technet.microsoft.com/Aorato-
Skeleton-Key-24e46b73
https://www.microsoft.com/en-
us/evalcenter/evaluate-microsoft-advanced-
threat-analytics
Skeleton key malware detection owasp
Skeleton key malware detection owasp
@TalBeerySec
@ItaiGrady

More Related Content

PPTX
One Key to Rule Them All: Detecting the Skeleton Key Malware
PDF
KPI_Mace_&_NonMace_WK03_20160121
PPTX
Latches & flipflops
PPTX
LDOの基本等価回路集
ODP
Trash Robotic Router Platform
PDF
E4 HPC Workshop 2012
PDF
怖くない誤差逆伝播法 Chainerを添えて
PDF
Microcontrolador Solidworks
One Key to Rule Them All: Detecting the Skeleton Key Malware
KPI_Mace_&_NonMace_WK03_20160121
Latches & flipflops
LDOの基本等価回路集
Trash Robotic Router Platform
E4 HPC Workshop 2012
怖くない誤差逆伝播法 Chainerを添えて
Microcontrolador Solidworks

What's hot (15)

PDF
Eastern Pacific
PDF
Eastern Pacific
PPTX
GNAT Pro User Day: Ada Factory
PDF
Processing Near Real-Time Global Vessel Data
PDF
GNAT Pro User Day: GNATdashboard - Tracking and Improving Software Quality
PPTX
Артем Чайкин - JAVA+GWT
PDF
Mesa and Its Debugging, Вадим Шовкопляс
PDF
V781 throttling
PDF
Dons Brief work history-2
PDF
Sprint 145
PPT
Magma trcak b
PDF
A Methodology for Automatic GPU Kernel Optimization
PDF
Production Ready Services at Netflix
PPTX
Demo gods are (not) on our side
PDF
Prow, ChatOps for open source projects
Eastern Pacific
Eastern Pacific
GNAT Pro User Day: Ada Factory
Processing Near Real-Time Global Vessel Data
GNAT Pro User Day: GNATdashboard - Tracking and Improving Software Quality
Артем Чайкин - JAVA+GWT
Mesa and Its Debugging, Вадим Шовкопляс
V781 throttling
Dons Brief work history-2
Sprint 145
Magma trcak b
A Methodology for Automatic GPU Kernel Optimization
Production Ready Services at Netflix
Demo gods are (not) on our side
Prow, ChatOps for open source projects
Ad

Similar to Skeleton key malware detection owasp (20)

PDF
Linux Performance 2018 (PerconaLive keynote)
PDF
Hp dv6 7000 goya balen 11254-3
PPTX
Clock Controlled Unipolar Stepping Motor Driver TB67S149FTG (Device Modeling ...
PDF
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
PDF
ATO Linux Performance 2018
DOCX
74ALVT162245DGG:11- Componentschip.com
PPTX
ECS H77H2-M4 rA.pptx
DOCX
74LVC1G175GW-Q100H -NXP Semiconductors/Freescale Semiconductor, Inc. - omoele...
 
PDF
PDF
ZAAA_x32 (Aspire E5-575_G_F5-573G_TM P259-MG) DAZAAMB16E0.pdf
PDF
fdocuments.in_the-ericsson-commands.pdf
PPTX
Update 37 models(SBD) in SPICE PARK(JUN2023)
PDF
Acer Aspire3 A315-51_QUANTA_ZAV_DA0ZAVMB8G0_REV.G.pdf
PDF
Fujitsu Lifebook LH532 DA0FJ8MB6F0 Schematic Diagram.pdf
PDF
Kernel Recipes 2013 - Deciphering Oopsies
DOC
Cataloge ge 3.control and_automation-27_vat300_e_c7_rev_c
PPT
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
PDF
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
PDF
LG DA0LG2MB6D0 REV D PDF.pdf
ODP
Debugging linux
Linux Performance 2018 (PerconaLive keynote)
Hp dv6 7000 goya balen 11254-3
Clock Controlled Unipolar Stepping Motor Driver TB67S149FTG (Device Modeling ...
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
ATO Linux Performance 2018
74ALVT162245DGG:11- Componentschip.com
ECS H77H2-M4 rA.pptx
74LVC1G175GW-Q100H -NXP Semiconductors/Freescale Semiconductor, Inc. - omoele...
 
ZAAA_x32 (Aspire E5-575_G_F5-573G_TM P259-MG) DAZAAMB16E0.pdf
fdocuments.in_the-ericsson-commands.pdf
Update 37 models(SBD) in SPICE PARK(JUN2023)
Acer Aspire3 A315-51_QUANTA_ZAV_DA0ZAVMB8G0_REV.G.pdf
Fujitsu Lifebook LH532 DA0FJ8MB6F0 Schematic Diagram.pdf
Kernel Recipes 2013 - Deciphering Oopsies
Cataloge ge 3.control and_automation-27_vat300_e_c7_rev_c
Lec7 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Dynamic Sch...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
LG DA0LG2MB6D0 REV D PDF.pdf
Debugging linux
Ad

More from Tal Be'ery (16)

PPTX
2 Become One, 1 Becomes Two: Attacking and Protecting 2FA Tokens
PDF
Give me some (key) space!
PPTX
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
PDF
Understanding Compound‘s Liquidation
PDF
Web3 Security: The Blockchain is Your SIEM
PPTX
The Color of Money
PDF
Open Sesame: Picking Locks with Cortana
PPTX
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
PDF
Automate or Die: How Automation Reshapes Cybersecurity
PDF
The Industrial Revolution of Lateral Movement
PPTX
The Enemy Within: Stopping Advanced Attacks Against Local Users
PDF
Target Breach Analysis
PPTX
Battlefield network
PPTX
Client sidesec 2013-intro
PPTX
Client sidesec 2013 - non js
PPTX
Client sidesec 2013 - script injection
2 Become One, 1 Becomes Two: Attacking and Protecting 2FA Tokens
Give me some (key) space!
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
Understanding Compound‘s Liquidation
Web3 Security: The Blockchain is Your SIEM
The Color of Money
Open Sesame: Picking Locks with Cortana
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
Automate or Die: How Automation Reshapes Cybersecurity
The Industrial Revolution of Lateral Movement
The Enemy Within: Stopping Advanced Attacks Against Local Users
Target Breach Analysis
Battlefield network
Client sidesec 2013-intro
Client sidesec 2013 - non js
Client sidesec 2013 - script injection

Skeleton key malware detection owasp

Editor's Notes

  • #6: http://twittersfollowers.com/wp-content/uploads/2013/03/facebook-fans.png
  • #7: Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities.
  • #21: NTLM relay talk 2014 by Oren Ofer
  • #27: 3 Data sources – Network traffic, AD data and SIEM events Create traps (Honeytokens) to mislead attackers