Upload
nipun-jaswal
View
240
Download
1
Embed Size (px)
Citation preview
#whoami
■ SOMEONE WHO LOVES BREAKING INTO TECHNOLOGY
■ TECHNICAL DIRECTOR, PYRAMID CYBER AND FORENSICS
■ INTERNATIONAL INFOSEC AUTHOR
■ CHAIR MEMBER, NCDRC
■ 10 YEARS, 20+ Zero Days ( Public ), 20+ Security Hall of Fame, 5 Books, 50+ Articles, OLD
■ WORKED WITH LAW ENFORCEMENT WORLDWIDE
MONEY | MONEY AND MONEY… $$$$$
I THINK, I CAN HACK THIS SOFTWARE AND TURN THIS
EPIC MATCHMAKING S**T INTO SOME HARD CASH
SO WHAT I HAVE TO DO?■ I NEED TO HACK THE SOFTWARE
■ I WANT TO GAIN ACCESS TO EVERY USER USING IT
■ ONCE I HAVE THE ACCESS, I WILL INSTALL MY CRPTOMINER ON THE TARGET
■ I WILL USE HIS SYSTEM TO MAKE MONEY, I MEAN A LOT OF MONEY
■ BUT WAIT, MY CHALLENGES:– I WILL HAVE TO GET THE SOFTWARE INSTALLED
LET’S GET THIS STARTED…■ OBSERVATIONS:
– NO BUFFER OVERFLOWS FOUND– ANTIVIRUS DETECTS MY BACKDOORED SOFTWARE
The Big Picture: Metasploit■ Let’s Place meterpreter.dll into the Kundli Software with the name VB5DB.dll
But.........We have the following set of problems:
■ Software not working can create suspicion and can land you in trouble
■ Antiviruses will literally eat the DLL like a Dog behind a Bone■ Your Access will be lost no matter what■ Let’s see how we can evade the problems… J
Preventions
1. Crackers make use of these techniques while distributing cracked software, patches etc.
2. Download from legitimate websites only.3. Verify Digital Signatures