Stuxnet Under the Microscope Aleksandr Matrosov, Senior Virus Researcher Eugene Rodionov, Rootkit Analyst David Harley, Senior Research Fellow Juraj Malcho, Head of Virus Laboratory 2 Contents CONTENTS ............................................................................................................................................................. 2 PREFACE ................................................................................................................................................................ 4 1 INTRODUCTION 1.1 TARGETED ATTACKS ............................................................................................................................. 5 1.2 STUXNET VERSUS AURORA ..................................................................................................................... 7 1.3 STUXNET REVEALED............................................................................................................................ 11 1.4 STATISTICS ON THE SPREAD OF THE STUXNET WORM ................................................................................ 15 2 MICROSOFT, MALWARE AND THE MEDIA ....................................................................................... 17 2.1 SCADA, SIEMENS AND STUXNET .......................................................................................................... 17 2.2 STUXNET TIMELINE ............................................................................................................................ 18 3 DISTRIBUTION ................................................................................................................................. 21 3.1 THE LNK EXPLOIT .............................................................................................................................. 21 3.1.1 Propagation via External Storage Devices ............................................................................... 24 3.1.2 Metasploit and WebDAV Exploit .............................................................................................. 24 3.1.3 What Do DLL Hijacking flaws and the LNK Exploit have in Common? ...................................... 24 3.2 LNK VULNERABILITY IN STUXNET .......................................................................................................... 26 3.3 THE MS10-061 ATTACK VECTOR......................................................................................................... 28 3.4 NETWORK SHARED FOLDERS AND RPC VULNERABILITY (MS08-067) ......................................................... 31 3.5 EXPLOITING UNPATCHED 0-DAY IN WIN32K.SYS ...................................................................................... 32 4 STUXNET IMPLEMENTATION 4.1 USER-MODE FUNCTIONALITY ................................................................................................................ 33 4.1.1 Overview of the main module .................................................................................................. 33 4.1.2 Injecting code ........................................................................................................................... 34 4.1.3 Injecting into a current process ................................................................................................ 34 4.1.4 Injecting into a new process ..................................................................................................... 37 4.1.5 Installation ............................................................................................................................... 37 4.1.6 Exported functions.................................................................................................................... 39 4.1.7 RPC Server ................................................................................................................................ 43 4.1.8 Resources ................................................................................................................................. 45 www.eset.com 3 4.2 KERNEL-MODE FUNCTIONALITY ............................................................................................................. 45 4.2.1 MRXCLS.sys............................................................................................................................... 47 4.2.2 MRXNET.sys .........................................

pdf文档 eset Stuxnet Under the Microscope 英文

安全报告 > 安全 > 文档预览
中文文档 67 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共67页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
eset Stuxnet Under the Microscope 英文 第 1 页 eset Stuxnet Under the Microscope 英文 第 2 页 eset Stuxnet Under the Microscope 英文 第 3 页
下载文档到电脑,方便使用
本文档由 思安2022-10-17 00:29:51上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。