Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Combating Spyware in the enterprise
Nội dung xem thử
Mô tả chi tiết
www.syngress.com
Syngress is committed to publishing high-quality books for IT Professionals and
delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase
via additional materials available from our Web site.
SOLUTIONS WEB SITE
To register your book, visit www.syngress.com/solutions. Once registered, you can
access our solutions@syngress.com Web pages. There you will find an assortment
of value-added features such as free e-booklets related to the topic of this book,
URLs of related Web site, FAQs from the book, corrections, and any updates from
the author(s).
ULTIMATE CDs
Our Ultimate CD product line offers our readers budget-conscious compilations of
some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect
way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration,
CyberCrime Investigation, Open Source Security, and Firewall Configuration, to
name a few.
DOWNLOADABLE EBOOKS
For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These eBooks are often available weeks before hard copies,
and are priced affordably.
SYNGRESS OUTLET
Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt
books at significant savings.
SITE LICENSING
Syngress has a well-established program for site licensing our ebooks onto servers
in corporations, educational institutions, and large organizations. Contact us at
sales@syngress.com for more information.
CUSTOM PUBLISHING
Many organizations welcome the ability to combine parts of multiple Syngress
books, as well as their own content, into a single volume for their own internal use.
Contact us at sales@syngress.com for more information.
Visit us at
374_Spyware_FM.qxd 6/30/06 4:47 PM Page i
Brian Baskin
Tony Bradley
Jeremy Faircloth
Craig A. Schiller
Ken Caruso
Paul Piccard
Lance James
Spyware in the
Enterprise
Combating
Tony Piltzecker Technical Editor
374_Spyware_FM.qxd 6/30/06 4:47 PM Page iii
Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be
obtained from the Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is
sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to
state.
In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other
incidental or consequential damages arising out from the Work or its contents. Because some states do not
allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation
may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working
with computers, networks, data, and files.
Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author
UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The
Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is
to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned
in this book are trademarks or service marks of their respective companies.
KEY SERIAL NUMBER
001 HJIRTCV764
002 PO9873D5FG
003 829KM8NJH2
004 387GGDWW29
005 CVPLQ6WQ23
006 VBP965T5T5
007 HJJJ863WD3E
008 2987GVTWMK
009 629MP5SDJT
010 IMWQ295T6T
PUBLISHED BY
Syngress Publishing, Inc.
800 Hingham Street
Rockland, MA 02370
Combating Spyware in the Enterprise
Copyright © 2006 by Syngress Publishing, Inc.All rights reserved. Except as permitted under the
Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer
system, but they may not be reproduced for publication.
1 2 3 4 5 6 7 8 9 0
ISBN: 1-59749-064-4
Publisher:Andrew Williams Page Layout and Art: Patricia Lupien
Acquisitions Editor: Erin Heffernan Copy Editor:Audrey Doyle
Technical Editor:Tony Piltzecker Indexer: Odessa&Cie
Cover Designer: Michael Kavish
374_Spyware_FM.qxd 6/30/06 4:47 PM Page iv
Acknowledgments
v
Syngress would like to acknowledge the following people for their kindness and support in making this book possible.
Syngress books are now distributed in the United States and Canada by O’Reilly
Media, Inc.The enthusiasm and work ethic at O’Reilly are incredible, and we would
like to thank everyone there for their time and efforts to bring Syngress books to
market:Tim O’Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko,
Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark
Wilson, Rick Brown,Tim Hinton, Kyle Hart, Sara Winge, Peter Pardo, Leslie Crandell,
Regina Aggio Wilkinson, Pascal Honscher, Preston Paull, Susan Thompson, Bruce
Stewart, Laura Schmier, Sue Willing, Mark Jacobsen, Betsy Waliszewski, Kathryn
Barrett, John Chodacki, Rob Bullington, Kerry Beck, and Karen Montgomery.
The incredibly hardworking team at Elsevier Science, including Jonathan Bunkell, Ian
Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother,
Miguel Sanchez, Klaus Beran, Emma Wyatt, Chris Hossack, Krista Leppiko, Marcel
Koppes, Judy Chappell, Radek Janousek, and Chris Reinders for making certain that
our vision remains worldwide in scope.
David Buckland, Marie Chieng, Lucy Chong, Leslie Lim,Audrey Gan, Pang Ai Hua,
Joseph Chan, and Siti Zuraidah Ahmad of STP Distributors for the enthusiasm with
which they receive our books.
David Scott, Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen
O’Donoghue, Bec Lowe, Mark Langley, and Anyo Geddes of Woodslane for distributing
our books throughout Australia, New Zealand, Papua New Guinea, Fiji,Tonga, Solomon
Islands, and the Cook Islands.
374_Spyware_FM.qxd 6/30/06 4:47 PM Page v
374_Spyware_FM.qxd 6/30/06 4:47 PM Page vi
vii
Technical Editor
Tony Piltzecker (CISSP, MCSE, CCNA, CCVP, Check Point
CCSA, Citrix CCA), author and technical editor of Syngress
Publishing’s MCSE Exam 70-296 Study Guide and DVD Training
System, is a Consulting Engineer for Networked Information
Systems in Woburn, MA. He is also a contributor to How to Cheat at
Managing Microsoft Operations Manager 2005 (Syngress, ISBN:
1597492515).
Tony’s specialties include network security design, Microsoft
operating system and applications architecture, as well as Cisco IP
Telephony implementations.Tony’s background includes positions as
IT Manager for SynQor Inc., Network Architect for Planning
Systems, Inc., and Senior Networking Consultant with Integrated
Information Systems.Along with his various certifications,Tony
holds a bachelor’s degree in Business Administration.Tony currently
resides in Leominster, MA, with his wife, Melanie, and his daughters, Kaitlyn and Noelle.
Brian Baskin (MCP, CTT+) is a researcher and developer for
Computer Sciences Corporation. In his work he researches,
develops, and instructs computer forensic techniques for members of
the government, military, and law enforcement. Brian currently specializes in Linux/Solaris intrusion investigations, as well as in-depth
analysis of various network protocols. He also has a penchant for
penetration testing and is currently developing and teaching basic
Contributors
374_Spyware_FM.qxd 6/30/06 4:47 PM Page vii
viii
exploitation techniques for clients. Brian has been developing and
instructing computer security courses since 2000, including presentations and training courses at the annual Department of Defense
Cyber Crime Conference. He is an avid amateur programmer in
many languages, beginning when his father purchased QuickC for
him when he was 11, and has geared much of his life around the
implementations of technology. He has also been an avid Linux user
since 1994, and he enjoys a relaxing terminal screen whenever he
can. He has worked in networking environments for many years
from small Novell networks to large Windows-based networks for a
number of the largest stock exchanges in the United States.
Brian would like to thank his wife and family for their continued support and motivation, as well as his friends and others who
have helped him along the way: j0hnny Long, Grumpy Andy,
En”Ron”,“Ranta, Don”,Thane,“Pappy”,“M”, Steve O.,Al Evans,
Chris pwnbbq, Koko, and others whom he may have forgotten.
Most importantly, Brian would like to thank his parents for their
continuous faith and sacrifice to help him achieve his dreams.
Brian wrote Chapter 5 (Solutions for the End User) and Chapter
6 (Forensic Detection and Removal)
Tony Bradley (CISSP-ISSAP, MCSE, MCSA,A+) is a Fortune
100 security architect and consultant with more than eight years of
computer networking and administration experience, focusing the
last four years on security.Tony provides design, implementation,
and management of security solutions for many Fortune 500 enterprise networks.Tony is also the writer and editor of the About.com
site for Internet/Network Security and writes frequently for many
technical publications and Web sites.
I want to thank my Sunshine for everything she has done
for me, and everything she does for me and for our family each day.
She is the glue that holds us together and the engine that drives us
forward.
I also want to thank Erin Heffernan and Jaime Quigley for
their patience and support as I worked to complete my contribu374_Spyware_FM.qxd 6/30/06 4:47 PM Page viii
ix
tions to this book. Lastly, I want to thank Syngress for inviting me
to participate on this project.
Tony wrote Chapter 1 (An Overview of Spyware) and Chapter 2
(The Transformation of Spyware)
Jeremy Faircloth (Security+, CCNA, MCSE, MCP+I,A+, etc.) is
an IT Manager for EchoStar Satellite L.L.C., where he and his team
architect and maintain enterprisewide client/server and Web-based
technologies. He also acts as a technical resource for other IT professionals, using his expertise to help others expand their knowledge.
As a systems engineer with over 13 years of real-world IT experience, he has become an expert in many areas, including Web development, database administration, enterprise security, network design,
and project management. Jeremy has contributed to several Syngress
books, including Microsoft Log Parser Toolkit (Syngress, ISBN:
1932266526), Managing and Securing a Cisco SWAN (ISBN: 1-
932266-91-7), C# for Java Programmers (ISBN: 1-931836-54-X),
Snort 2.0 Intrusion Detection (ISBN: 1-931836-74-4), and Security+
Study Guide & DVD Training System (ISBN: 1-931836-72-8).
Jeremy wrote Chapter 3 (Spyware and the Enterprise Network)
Craig A. Schiller (CISSP-ISSMP, ISSAP) is the President of
Hawkeye Security Training, LLC. He is the primary author of the
first Generally Accepted System Security Principles. He was a coauthor of several editions of the Handbook of Information Security
Management and a contributing author to Data Security Management.
Craig is also a contributor to Winternals Defragmentation, Recovery, and
Administration Field Guide (Syngress, ISBN: 1597490792). Craig has
cofounded two ISSA U.S. regional chapters: the Central Plains
Chapter and the Texas Gulf Coast Chapter. He is a member of the
Police Reserve Specialists unit of the Hillsboro Police Department
in Oregon. He leads the unit’s Police-to-Business-High-Tech
speakers’ initiative and assists with Internet forensics.
374_Spyware_FM.qxd 6/30/06 4:47 PM Page ix
x
Craig wrote Chapter 4 (Real SPYware—Crime, Economic
Espionage, and Espionage)
Ken Caruso is a Senior Systems Engineer for Serials Solutions, a
Pro Quest company. Serials Solutions empowers librarians and
enables their patrons by helping them get the most value out of
their electronic serials. Ken plays a key role in the design and engineering of mission-critical customer-facing systems and networks.
Previous to this position, Ken has worked at Alteon, a Boeing
Company, Elevenwireless, and Digital Equipment Corporation.
Ken’s expertise includes wireless networking, digital security, and
design and implementation of mission-critical systems. Outside of
the corporate sector Ken is cofounder of Seattlewireless.net, one of
the first community wireless networking projects in the U.S. Ken is
a contributor to OS X for Hackers at Heart (Syngress, ISBN:
1597490407).
Ken studied Computer Science at Daniel Webster College
and is a member of The Shmoo Group of Security Professionals.
Ken has been invited to speak at many technology and security
events, including but not limited to Defcon, San Diego Telecom
Council, Society of Broadcast Engineers, and CPSR: Shaping the
Network Society.
Ken wrote Chapter 7 (Dealing with Spyware in a non-Microsoft
World)
Paul Piccard serves as Director of Threat Research for Webroot,
where he focuses on research and development, and provides early
identification, warning, and response services to Webroot customers.
Prior to joining Webroot, Piccard was manager of Internet Security
Systems’ Global Threat Operations Center.This state-of-the-art
detection and analysis facility maintains a constant global view of
Internet threats and is responsible for tracking and analyzing
hackers, malicious Internet activity, and global Internet security
threats on four continents.
374_Spyware_FM.qxd 6/30/06 4:47 PM Page x
xi
His career includes management positions at VistaScape
Security Systems, Lehman Brothers, and Coopers & Lybrand.
Piccard was researcher and author of the quarterly Internet Risk
Impact Summary (IRIS) report. He holds a Bachelor of Arts from
Fordham University in New York.
Paul wrote Chapter 8 (The Frugal Engineer’s Guide to Spyware
Prevention)
Lance James has been heavily involved with the information security community for the past 10 years. With over a decade of experience with programming, network security, reverse engineering,
cryptography design and cryptanalysis, attacking protocols, and a
detailed expertise in information security, Lance provides consultation to numerous businesses ranging from small start-ups, governments, both national and international, as well as Fortune 500’s and
America’s top financial institutions. He has spent the last three years
devising techniques to prevent, track, and detect phishing and online
fraud. He is a lead scientist with Dachb0den Laboratories, a wellknown Southern California “hacker” think tank; creator of
InvisibleNet; a prominent member of the local 2600 chapter; and
the Chief Scientist with Secure Science Corporation, a security software company that is busy tracking over 53 phishing groups.As a
regular speaker at numerous security conferences and a consistent
source of information by various news organizations, Lance is recognized as a major asset in the information security community.
Lance wrote Appendix A (Malware, Money Movers, and Ma Bell
Mayhem!)
374_Spyware_FM.qxd 6/30/06 4:47 PM Page xi
374_Spyware_FM.qxd 6/30/06 4:47 PM Page xii
xiii
Contents
Chapter 1 An Overview of Spyware . . . . . . . . . . . . . . . . 1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Spyware: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
How Spyware Works . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Why Spyware Is Not a “Virus” . . . . . . . . . . . . . . . . . .5
Commonly Seen Spyware . . . . . . . . . . . . . . . . . . . . . . .5
Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Malware: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
How Malware Works . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Commonly Seen Malware . . . . . . . . . . . . . . . . . . . . . . . .8
Adware: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
How Adware Works . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Commonly Seen Adware . . . . . . . . . . . . . . . . . . . . . . . .10
Parasiteware: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
How Parasiteware Works . . . . . . . . . . . . . . . . . . . . . . .11
Commonly Seen Parasiteware . . . . . . . . . . . . . . . . . . . .12
Phishing: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
How Phishing Works . . . . . . . . . . . . . . . . . . . . . . . . . .12
Commonly Seen Phishing Attacks . . . . . . . . . . . . . . . . .14
PayPal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
eBay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Citibank . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Washington Mutual . . . . . . . . . . . . . . . . . . . . . . . . .17
IRS Tax Refund . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Botnets: Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
How Botnets Work . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Commonly Seen Botnets . . . . . . . . . . . . . . . . . . . . . . . .19
374_Spyware_TOC.qxd 6/30/06 5:15 PM Page xiii
xiv Contents
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .24
Chapter 2 The Transformation of Spyware . . . . . . . . . . 27
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
The Humble Beginnings . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Targeted Marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Hitting the Internet Target . . . . . . . . . . . . . . . . . . . . . . .30
Selling Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Adware Evolves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Making a Name for Itself . . . . . . . . . . . . . . . . . . . . . . .34
All Roads Lead to Microsoft . . . . . . . . . . . . . . . . . . .34
The Making of a Buzzword . . . . . . . . . . . . . . . . . . .34
The Early Effects of Spyware . . . . . . . . . . . . . . . . . . . .35
Early Means of Prevention . . . . . . . . . . . . . . . . . . . . . . .35
Spyware in the Twenty-First Century . . . . . . . . . . . . . . . . . .38
How Spyware Has Evolved . . . . . . . . . . . . . . . . . . . . .38
Increased Use of Spyware
in the Commission of Criminal Acts . . . . . . . . . . . . .39
Antispyware Legislation . . . . . . . . . . . . . . . . . . . . . . . . .41
The Future of Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .46
Chapter 3 Spyware and the Enterprise Network . . . . . 49
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Keystroke Loggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
How Keystroke Loggers Work . . . . . . . . . . . . . . . . . . .53
Known Keystroke Loggers . . . . . . . . . . . . . . . . . . . . . .56
KeyGhost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
KEYKatcher/KEYPhantom . . . . . . . . . . . . . . . . . . .57
Invisible KeyLogger Stealth . . . . . . . . . . . . . . . . . . . .58
Spector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Boss EveryWhere . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Known Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
374_Spyware_TOC.qxd 6/30/06 5:15 PM Page xiv
Contents xv
Trojan Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
How Spyware Works with Trojan Horses . . . . . . . . . . .63
Known Spyware/Trojan Software . . . . . . . . . . . . . . . . .65
D1Der . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Sony Digital Rights Management . . . . . . . . . . . . . . .66
Kazanon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Spyware and Backdoors . . . . . . . . . . . . . . . . . . . . . . . . . . .68
How Spyware Creates Backdoors . . . . . . . . . . . . . . . . .68
Known Spyware/Backdoor Combinations . . . . . . . . . . .70
A Wolf in Sheep’s Clothing: Fake Removal Tools . . . . . .71
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .77
Chapter 4 Real Spyware—Crime,
Economic Espionage, and Espionage . . . . . . . . . . . . . . 79
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
White to Gray to Black—
Increasing Criminal Use of Spyware . . . . . . . . . . . . . . . . . .81
White to Gray—Ethical to Unethical . . . . . . . . . . . . . . .82
Hacker Ethic to Criminal Ethic . . . . . . . . . . . . . . . . . . .82
Unethical Practices for the Benefit of Companies . . . . . .84
Spyware for Government Use . . . . . . . . . . . . . . . . . . . .86
It’s All in the Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Targeted, Networked Spyware . . . . . . . . . . . . . . . . . . . .89
Phishing Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Botnets Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
The Botnet-Spam and Phishing Connection . . . . . . .99
Phishing Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
What to Look For . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106
Internet Resources . . . . . . . . . . . . . . . . . . . . . . . . . . .107
Reporting Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108
Law Enforcement . . . . . . . . . . . . . . . . . . . . . . . . . . . .110
Antiphishing Consortiums . . . . . . . . . . . . . . . . . . . . . .112
Antiphishing Software Vendors . . . . . . . . . . . . . . . . . . .115
Bot Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116
Detecting Bots on a Host . . . . . . . . . . . . . . . . . . . . . .116
374_Spyware_TOC.qxd 6/30/06 5:15 PM Page xv