2017
DOI: 10.5815/ijcnis.2017.07.01
|View full text |Cite
|
Sign up to set email alerts
|

Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors

Abstract: Abstract-Advanced Persistent Threat (APT) actors seek to maintain an undetected presence over a considerable duration and therefore use a myriad of techniques to achieve this requirement. This stealthy presence might be sought on the targeted victim or one of the victims used as pawns for further attacks. However, most of the techniques involve some malicious software leveraging the vulnerability induced by an exploit or leveraging the ignorance of the benign user. But then, malware generates a substantial amo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 3 publications
(4 reference statements)
0
5
0
Order By: Relevance
“…The thread seeks to establish a connection on port 445 to exploit CVE-2017-0143 if the SMB vulnerability is present on any host in the scanned IP addresses. In our use case, we infect a vulnerable host in the subnet with RDP backdoor vulnerability [27]. Based on the CVE values, we deduce = 0.430 and = 2 using the base score, where is the attack steps and the attack complexity.…”
Section: A Internal Subnetmentioning
confidence: 99%
“…The thread seeks to establish a connection on port 445 to exploit CVE-2017-0143 if the SMB vulnerability is present on any host in the scanned IP addresses. In our use case, we infect a vulnerable host in the subnet with RDP backdoor vulnerability [27]. Based on the CVE values, we deduce = 0.430 and = 2 using the base score, where is the attack steps and the attack complexity.…”
Section: A Internal Subnetmentioning
confidence: 99%
“…In light of the above, the attack scenarios of our experiments resume from the pivot nodes. Further, we use malware-free intrusions [19] as the infection vector.…”
Section: Figure 5 Illustrative Attack Graphmentioning
confidence: 99%
“…With conditions (cf. Equation 3) satisfied that actualize the pursued infection vector [19], we implant the ransomware on the targeted victim and perform dynamic analysis. For reverse engineering the ransomware code, we perform static code dissection on the binary using an interactive disassembler IDA Pro and a debugger Ollydbg.…”
Section: Figure 6 Ransomware Dynamic Analysis Test-bed Setupmentioning
confidence: 99%
“…We assume all necessary preconditions for establishing a DNS tunnel have been implemented on the target host via a malware-free intrusion. In this model, we use a malware-free intrusion from our previous work [9] as an infection vector to implant an agent for facilitating a DNS tunnel.…”
Section: Figure 2 Illustrative Attack Graphmentioning
confidence: 99%
“…The attacker has a public IP address whereas the clients have private IP addresses from the local area network (LAN). We use Dnscat2 [10] for tunnel establishment on the serverside and we implant the client agent on the victim (client-side) using malware-free intrusion [9]. The attacker gains entry to the network, equivalent to accessing any of the entry nodes { 0 , 1 , 2 , … , + } in the attack model, using a cabled Ethernet connection with a public IP address.…”
Section: Figure 3 Dns Tunneling Experiments Setupmentioning
confidence: 99%