Malware Lab
Cyber Lab S23 - Week 1
Announcements
Overview
Meet the Team
Benson Liu
Co-President
Sanjana Sarda
Mentor & Security Engineer @ Nuro
You
MVP
Emily Sun
Officer
Rory Hemmings
Malware Lab Project Lead
✨Social Engineering Time ✨
Goal
Logistics
Timeline
Part 1: Developing the Core Rootkit
Part 2: Design Your Own Features
Team Formation
VM Setup
⚠️WARNING⚠️
VM Setup Guide
Background
What is malware?
The best way to learn how to defend malware is to learn to develop with an adversarial mindset!
Malware Development
Phase | Description |
1. Reconnaissance | Identify the target and explores vulnerabilities and weaknesses that can be exploited within the network |
2. Weaponization | Create the attack vector (i.e. remote access malware, ransomware, virus) |
3. Delivery | Launch the attack |
4. Exploitation | Malicious code is executed in the victim’s system |
5. Installation | Malware is installed on the victim’s system |
6. Command & Control | Attacker uses malware to assume remote control of a device or identity within the target network |
7. Actions on Objective | Attacker carries out intended goals (i.e. data theft, destruction, etc.) |
What is a rootkit?
Hooking Syscalls
System Calls
Hooking a Syscall
Shared Libraries
Shared Libraries
Shared Libraries
Shared Libraries Example
Shared Libraries Example
Syscalls & Shared Libraries Example
Syscalls & Shared Libraries Example
puts Demo in Action
Check out our linktree: