EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration
نویسندگان
چکیده
The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending citizens from harm delivered through exploit kits. In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a wide range of 30 real-world exploit kits and analyze a counter-offensive adversarial model against the kits and kit operator. Guided by our analysis, we present a systematic methodology for examining a given kit to determine where vulnerabilities may reside within its serverside implementation. In our experiments, we found over 180 vulnerabilities among 16 exploit kits of those surveyed, and were able to automatically synthesize exploits for infiltrating 6 of them. The results validate our hypothesis that exploit kits largely lack sophistication necessary to resist counter-offensive activities. We then propose the design of EKHUNTER, a system that is capable of automatically detecting the presence of exploit vulnerabilities and deriving laboratory test cases that can compromise both the integrity of a fielded exploit kit, and even the identity of the kit operator. Keywords— exploit kits, web malware, offensive technologies, cybercrime.
منابع مشابه
Birhanu Eshete
My research interests span the areas of systems security, cyber-crime analysis, big-data security analytics, and machine learning for security. In systems security, I particularly focus on the analysis and detection of advanced and persistent threats, web application security, and web-borne malware defense. In cyber-crime analysis, I focus on malicious sites/URLs, exploit kits, and ransomware. ...
متن کاملInternet hack back: counter attacks as self-defense or vigilantism?
The poor state of security on the Internet calls for more effective ways to protect networked systems from attacks. One solution is to be able to counter attack with offensive capabilities. With attacker information available, companies find themselves in a dilemma – counter attack for immediate self-defense, retaliate for future deterrence, inform the appropriate law enforcement authorities, o...
متن کاملImplementing the Five Canonical Offensive Maneuvers in a CGF Environment
In this paper we describe the algorithms and underlying machinery necessary to implement the five canonical offensive maneuvers described in U. S. Army Field Manual FM 3-21, Section II, Forms of Maneuver (envelopment, turning movement, infiltration, penetration, and frontal attack) within a computer generated forces environment. We also include descriptions of algorithms for calculating groups ...
متن کاملA Graphical Modeling Environment for the Generation of Workflows for the Globus Toolkit
Grid computing aims at managing resources in a heterogeneous distributed environment. The Globus Toolkit provides a set of components that can be used to build applications that function in a grid computing system. Presently, applications are typically handcrafted either by using an Application Programming Interface (API) interacting through a set of command line interfaces, or by using a set o...
متن کاملDiscovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit
In today’s data-driven world, programmers routinely incorporate user data into complex algorithms, heuristics, and application pipelines. While often beneficial, this practice can have unintended and detrimental consequences, such as the discriminatory effects identified in Staples’ online pricing algorithm and the racially offensive labels recently found in Google’s image tagger. We argue that...
متن کامل