1 / 16

SpyWare!

SpyWare!. Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow. Agenda. Define SpyWare Discuss methods used for spying Focus on passive tracking methods Demonstrate one passive method Discuss prevention Conclusions. SpyWare Definition.

gabe
Download Presentation

SpyWare!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SpyWare! Chuck Short CS522 – Fall 2006 Semester Project Presentation Professor: Dr. C. Edward Chow

  2. Agenda • Define SpyWare • Discuss methods used for spying • Focus on passive tracking methods • Demonstrate one passive method • Discuss prevention • Conclusions

  3. SpyWare Definition • SpyWare is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx

  4. SpyWare Categories • Advertising (Passive) • Capture browsing history • Capture buying habits • Surveillance (Active) • Key loggers • System Monitors

  5. SpyWare Statistics • 90% of all internet connected machines are infected • ~28 SpyWare traces on each machine • 1/3 infected with surveillance SpyWare • 80% of infections were cookies

  6. Passive Tracking Methods • Web Beacons • Cookies deposits

  7. Web Beacons • Also know as • Web Bugs • Clear GIFs • Allows destination to log page hits • Can be used in conjunction with cookies

  8. Cookie Fields

  9. Web Beacon w/Cookie Example: spywareWebBeaconCookieDeposit.html <html> <head> <title>Web Beacon Cookie Deposit Example</title> </head> <body> <h1><b>Web Beacon Cookie Deposit Example:</b></h1> <hr /> <img src="http://www.cs.uccs.edu/~cdshort/serverWebBeacon.php" alt="Picture" width="0" height ="0" border = "0" /> </body> </html>

  10. Server CodeserverWebBeacon.php <?php if (!(isset($_COOKIE["SpyCookie"]))){ setcookie("SpyCookie", "ISpyOnYou", time()+3600); } ?> <html> <head> <title>PHP Test</title> </head> <body> <?php $filename = 'cookieCapture.txt'; $today = date("D M j G:i:s T Y"); $Content = "SpyCookie" . " : " . "$_COOKIE[SpyCookie]" . " : " . "$today\r\n"; if($handle = fopen($filename, 'a')){ fwrite($handle, $Content); fclose($handle); } ?> </body> </html>

  11. Cookie Capture File [cdshort@windom public_html]$ cat cookieCapture.txt SpyCookie : ISpyOnYou : Fri Dec 1 18:30:17 MST 2006 SpyCookie : ISpyOnYou : Fri Dec 1 18:30:38 MST 2006 [cdshort@windom public_html]$

  12. Packet Capture

  13. Conclusions • Browser settings can prevent cookie deposit • Be careful what you download • Don’t open the door willingly • The use of cookies is fundamental • The information provided is minimal

  14. Questions?

  15. References • http://www.php.net/manual/en/function.setcookie.php • http://cs.uccs.edu/~cs301/php/php.html • Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu,Peng-Chu Wang and Wei-Zen Su. A Surveillance Spyware Detection System Based on Data Mining Methods. 2006 IEEE Congress on Evolutionary Computation. • http://www.allaboutcookies.org/web-beacons/ • Wes Ames, Understanding Spyware: Risk and Response, 2004 IEEE IT Pro • http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx • http://www.earthlink.net/about/press/pr_spyAudit/

More Related