dc.contributor.author |
Swart, I
|
|
dc.date.accessioned |
2013-03-19T07:23:20Z |
|
dc.date.available |
2013-03-19T07:23:20Z |
|
dc.date.issued |
2012-07 |
|
dc.identifier.citation |
Swart, I. 2012. Practical application of open source frameworks to achieve anti-virus avoidance. In: 11th European Conference on Information Warfare and Security (ECIW 2012), Laval, France, 5-6 July 2012 |
en_US |
dc.identifier.uri |
http://academic-conferences.org/pdfs/BU_2012-13-Nov/ECIW_2012-Abstract-booklet.pdf
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/6574
|
|
dc.description |
11th European Conference on Information Warfare and Security (ECIW 2012), Laval, France, 5-6 July 2012. Published in Academic conferences. |
en_US |
dc.description.abstract |
A common aim of malware creators is to have the ability to spread their software undetected through various networks until the required goal is completed. In response to this, anti-virus vendors have implemented various strategies to detect viruses as they attempt to execute and propagate from one target to the next. Some of the anti-virus vendors claim to achieve impressive success rates as high as 98.7% that indicates the problem of spreading viruses and malware is well taken care of. Yet, despite the impressive detection rates, a proliferation of open source tools, frameworks and utilities are being introduced that claim to have the ability to avoid anti-virus detection. As an example, the very popular Metasploit framework has several encoders available that can alter the virus signature in such a way that it will avoid the anti-virus engine and allow the malicious code to be executed. This approach has been implemented and simplified in the Social Engineering Toolkit (SET) as part of a menu driven approach that is accessible to people with a relatively low skill level. The SET framework, implemented in Metasploit, is only one such framework and several more specialised open source tools exist, that does not only focus on encoding but on other common anti-virus avoidance techniques such as binary editing, packing and encryption. Open source packages such as UPX compress the data in the selected virus executable to such an extent that it will most likely completely circumvent the anti-virus and similarly so for a program that is encrypted with a common encryption product such as TrueCrypt. Should the anti-virus still detect the offending executable after either packing or encryption a combination of the two applications might yield superior results. The aim of this paper is to experiment on a common executable that is classified as malware e.g. the meterpreter module of Metasploit, and make use of the various open source frameworks and utilities to document the techniques and success rate of anti-virus avoidance. By presenting the results of this research, it will contribute to the understanding of security personnel / researchers on what can be achieved with open source frameworks and how to better protect against the virus threat. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences International Ltd |
en_US |
dc.relation.ispartofseries |
Workflow;10284 |
|
dc.subject |
Anti-virus avoidance |
en_US |
dc.subject |
Virus threats |
en_US |
dc.subject |
Open source packer |
en_US |
dc.subject |
Metasploit frameworks |
en_US |
dc.title |
Practical application of open source frameworks to achieve anti-virus avoidance |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Swart, I. (2012). Practical application of open source frameworks to achieve anti-virus avoidance. Academic Conferences International Ltd. http://hdl.handle.net/10204/6574 |
en_ZA |
dc.identifier.chicagocitation |
Swart, I. "Practical application of open source frameworks to achieve anti-virus avoidance." (2012): http://hdl.handle.net/10204/6574 |
en_ZA |
dc.identifier.vancouvercitation |
Swart I, Practical application of open source frameworks to achieve anti-virus avoidance; Academic Conferences International Ltd; 2012. http://hdl.handle.net/10204/6574 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Swart, I
AB - A common aim of malware creators is to have the ability to spread their software undetected through various networks until the required goal is completed. In response to this, anti-virus vendors have implemented various strategies to detect viruses as they attempt to execute and propagate from one target to the next. Some of the anti-virus vendors claim to achieve impressive success rates as high as 98.7% that indicates the problem of spreading viruses and malware is well taken care of. Yet, despite the impressive detection rates, a proliferation of open source tools, frameworks and utilities are being introduced that claim to have the ability to avoid anti-virus detection. As an example, the very popular Metasploit framework has several encoders available that can alter the virus signature in such a way that it will avoid the anti-virus engine and allow the malicious code to be executed. This approach has been implemented and simplified in the Social Engineering Toolkit (SET) as part of a menu driven approach that is accessible to people with a relatively low skill level. The SET framework, implemented in Metasploit, is only one such framework and several more specialised open source tools exist, that does not only focus on encoding but on other common anti-virus avoidance techniques such as binary editing, packing and encryption. Open source packages such as UPX compress the data in the selected virus executable to such an extent that it will most likely completely circumvent the anti-virus and similarly so for a program that is encrypted with a common encryption product such as TrueCrypt. Should the anti-virus still detect the offending executable after either packing or encryption a combination of the two applications might yield superior results. The aim of this paper is to experiment on a common executable that is classified as malware e.g. the meterpreter module of Metasploit, and make use of the various open source frameworks and utilities to document the techniques and success rate of anti-virus avoidance. By presenting the results of this research, it will contribute to the understanding of security personnel / researchers on what can be achieved with open source frameworks and how to better protect against the virus threat.
DA - 2012-07
DB - ResearchSpace
DP - CSIR
KW - Anti-virus avoidance
KW - Virus threats
KW - Open source packer
KW - Metasploit frameworks
LK - https://researchspace.csir.co.za
PY - 2012
T1 - Practical application of open source frameworks to achieve anti-virus avoidance
TI - Practical application of open source frameworks to achieve anti-virus avoidance
UR - http://hdl.handle.net/10204/6574
ER -
|
en_ZA |