
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 203
Viathenonemailroute:
IfGIAChasanantivirussolutionrunning,theemailattachmentmaybestripped
beforereachingtheendusers. Toworkaroundthis,wecan setupaFTPlocation
somewhereontheinternettohostthefile.Then,sendanemailtothecontactpeople
inGIACwithnoattachment.Intheemail,tellthemthatwerepresentasupplierwith
gooddealsforthem.Askthem tologontoourFTP anddownloadthe“catalog”file.
ForkBombsandViruses
Abovearejustexamplesofhowwecan“bypass”theunderfiredsecurity
architecture.The“files”weusecanbeamacrovirus,aforkbomboranythingelse.
AccordingtoRohitSingh,ForkBombsare:
“…programsorshellscriptswhich(either intentionallyoraccidentally)createnew
processesrepeatedly(usingthefork()systemcall.)Newprocessesarecreatedsofast
thatwithinnotimetheprocesstablegetsfilledupandthesystemcomestoagrinding
halt.Nootherprocesscanthenbe started,noteven'ps'toseewhotriggeredthatfork
bomb!Killingthatforkbombmeansyetanotherprocess,andthat’sexactlywhatis
scarce!AforkbombmightmeanpressingthebigRedbutton!”
76
AccordingtotheWordMacroVirusFAQ,aWordMacroVirus:
“…isamacro(listofinstructions)ortemplatefile(usuallywiththe.DOTextension)
whichmasquerades as legitimateMSWORDdocuments(usuallywiththeextension
*.DOC).Aninfected*.DOCfile,doesn'tlookanydifferenttotheaveragePCuser,as
itcanstillcontainanormaldocument.Thedifferenceisthatthisdocumentisreally
justatemplateormacrofile,withinstructions toreplicate,andpossiblycause
damage.M SWORDwillinterpretthe*.DOTmacro/templatefileregardlessof
extension,asatemplatefile.Thisallowsforitbeingpassedoffasalegitimate
document(*.DOC)ThisFAQtakesthepositionthatadocumentismeanttobeDATA,
andaMACROisatleastpartiallyexecutableCODE.Whenadocumenthasbeen
infected,ithasbeenmergedwithexecutablecodeinamultipartfile,partdata/part
76
http://rexgrep.tripod.com/rexfbdmain.htm
Kommentare zu diesen Handbüchern