110 likes | 224 Views
This overview discusses file-based attacks targeting Windows XP, focusing on macro-enabled documents and other file types. With many common programs allowing macros, they pose a significant threat as they can execute harmful programs. The lab content covers the creation and investigation of a virus, demonstrating how macro attacks work. Additionally, students will learn to defend against HTML-based attacks and malformed Word documents. Stay informed about these vulnerabilities to enhance security measures against evolving threats.
E N D
Windows XP File-Based Attacks Chris Dalbec & Chris Woodard
Overview • Why This Topic • Background • Macros • Other Files • Lab Contents
Motivation • File-Based attacks are popular over email and peer to peer programs • New unpatched exploits • Unaddressed in previous labs
Macros • Some of the most common windows programs allow for macros • Macros are mini programs ran inside Microsoft office documents for efficiency • Macros are can execute programs installed on windows
When Good Macros Go Bad • One of the most popular internet attacks come from the downloading of macro enabled documents • Why are they so potentially dangerous
Other Files • Malformed Word Doc • HTML Files • Vector Markup Language • MSHTML • Windows Metafile
Section 1 - Macros • This portion of the lab will focus on macro attack • The student will: • follow the procedure to produce a virus • Inspect and investigate the created virus • Run the virus exploit • Review and test safe measure to prevent the exploit
Short video of Exploit Walrus Virus Editor in action!
Section 2 - Other Attacks Students will learn how to defend against • HTML based Attacks • Malformed Word Documents • WMF Attacks
References • www.wikipedia.org • www.milw0rm.com