码工 发表于 2011-12-22 08:53

现代恶意软件的传播技术

<font size="3"><strong>1.6 现代恶意软件的传播技术</strong></font><p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">由于网络应用程序、网络服务和操作系统功能中具有创造力的进步,对于</span><span lang="EN-US">IDS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">来说,发现恶意软件的传播已经比以前困难得多了。</span><span lang="EN-US">IDS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">特征码已经被证明在对抗</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">恶意软件的新版本或者多态的恶意软件时没有什么帮助。在</span><span lang="EN-US">21</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">世纪初,出现了全新的传播技术,这些技术起源于从过去的恶意软件爆发时学习到的经验。</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">恶意软件已经发展到如此高的水平,以致我们现在只能依赖专家来预测可能出现的恶意软件爆发事件,或者旧的技术在什么地方采用创新的方法造成比过去更大的破</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">坏。新的技术利用操作系统和应用程序的系统改进和功能升级来对付最终用户。表</span><span lang="EN-US">1-3</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">列出了恶意软件传播方法的一些最新进展。</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">表</span><span lang="EN-US">1-3</span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">中描述的蠕虫使用了新的传染和传播方法并且成为近期</span><span lang="EN-US">IT</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">界重要的恶意软件爆发的根源。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">表</span><span lang="EN-US">1-3 </span><span style="font-family: 宋体;">恶意软件的革新</span></p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628433a4Nl.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628433a4Nl.jpg" .load="imgResize(this, 650);" ;="" border="0"></a>
</p>



<p class="MsoNormal"><span lang="EN-US">Downadup</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">蠕虫在不到</span><span lang="EN-US">5</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">天的时间内感染了超过</span><span lang="EN-US">900</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">万台计算机。评估恶意病毒的开发非常重要</span><span lang="EN-US">—</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">从对付组织的针对性恶意软件到执行恶意代码远程控制受</span> <span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">害计算机的简单客户端利用程序。尽管在刊物和每个人阅读的报纸上报道的几乎所有流行的实例都是以</span><span lang="EN-US">Microsoft Windows</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">为焦点的恶意软件,但确定所有恶意软件的数量仍然很关键。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">在恶意软件最初发展阶段使用的技术在当今的恶意软件版本中仍然概念性地存在。由于网络的进步以及简化网络管理员日常任务和职责的路由服务的开发,这些技术</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">造成的损害比过去更大了。</span> <span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">在</span><span lang="EN-US">21</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">世纪来临的时刻,恶意软件制作者也开始使用让取证分析师和网络防御专家更加难以识别和缓解的技术。历史上,这些方法包括了从传统的简单方法到使世界上的许多管理员感到头疼的具有很强的独创性的方法。在下面的部分中,我将讨论一次最大的恶意软件爆发事件,然后描述其他的恶意软件实例及其功能性。</span></p>



<blockquote><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">注意:你可在本书的伙伴网站上下载并且打开</span><span lang="EN-US">IDA
Pro</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">映像用于个人研究和教育用途。</span> <span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">每个阶段,我们将告诉你应该打开哪个映像阅读,以识别所讨论的技术并且用一个健壮的分析工具分析所提出的恶意软件实例。我们建议使用</span><span lang="EN-US">IDA Pro</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">工具,你可以从</span><span lang="EN-US">http://www.hex-rays.com/idapro/</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">下载它,免费的试用版本能够对读者可在本书网站上取得的实例进行只读访问。</span></blockquote><p class="MsoNormal">
</p>



<p class="MsoNormal"><span lang="EN-US">2007</span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">年,我们有幸遇到了到目前为止最难以捉摸,最具有说服力表现的一种蠕虫,在</span><span lang="EN-US">2008</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">年中期,这种蠕虫仍然活跃,只是因为业界开发了多种对抗措施才使得它的新变种难以很快出现。</span></p>



<p class="MsoNormal"><b><font size="3"><span lang="EN-US">1.6.1&nbsp; StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">(恶意软件实例:</span><span lang="EN-US">trojan.peacomm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">)</span></font></b></p>



<p class="MsoNormal"><span lang="EN-US">StormWorm</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">是一个邮件蠕虫,采用社会工程,在来自可信朋友的邮件中附加二进制文件或者在</span><span lang="EN-US">Microsoft Office</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">附件中嵌入恶意代码,然后对</span><span lang="EN-US">Microsoft
Internet Explorer</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">和</span><span lang="EN-US">Microsoft Office</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">(具体版本是</span><span lang="EN-US">2003</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">和</span><span lang="EN-US">2007</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)的脆弱版本发动大家熟悉的客户端攻击。</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">是一种影响使用</span><span lang="EN-US">Microsoft</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">操作系统的对等</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">僵尸网络框架和后门特洛伊木马,在</span><span lang="EN-US">2007</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">年</span><span lang="EN-US">1</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">月</span><span lang="EN-US">17</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">日最早发现。</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">培育了一个对等僵尸场网络(</span><span lang="EN-US">botnet
farm network</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">),这是一种更新的控制指挥技术,用来确保集群的持续性,并且增强了它的控制指挥中心的生存能力,因为在这里没有单独的中央控制点。每台被</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">侵害的机器连接到整个僵尸网络集群的一个子集,包括</span><span lang="EN-US">25</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">~</span><span lang="EN-US">50</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">台其他受侵害的机器。在图</span><span lang="EN-US">1-5</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">中,你可以看到</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">的控制指挥结构的效率</span><span lang="EN-US">—</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">这</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">是它难以防范和跟踪的主要原因之一。</span> </p>





<p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628455HHZm.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628455HHZm.jpg" .load="imgResize(this, 650);" ;="" border="0"></a><span style="font-family: 宋体;"><br></span></p><p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">图</span><span lang="EN-US">1-5 </span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">按国家分布的</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">感染情况</span><span lang="EN-US"> <br></span></p>

<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">在对等僵尸网络中,没有一台机器拥有整个网络的完整列表;每台机器只有总表的一个子集,这些子集中含有重叠的机器,分布得像一个错综复杂的蜘蛛网,使得这</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">个邪恶的网络的范围难以确定。</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">的大小从未被精确计算过,但是,估计它是有史以来最大的僵尸网络,可能包含</span><span lang="EN-US">100</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">万~</span><span lang="EN-US">1000</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">万个受害系</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">统。</span><span lang="EN-US">StormWorm</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">如此巨大,以至于在其运作者发现多家国际安全集团积极与这一僵尸网络战斗并试图拆除它时,向这些安全集团发动了攻击。由于这一国际</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">性僵尸网络的强大力量,国际性的安全集团和机构遭到了挫败。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">感染时,</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">将安装</span><span lang="EN-US">Win32.Agent.dh</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">,这不可避免地导致制作者实现的第一个变种的垮台。有些安全集团感到,这个缺陷可能是一个未知实体的一种预先测试或者武器测试,因为实际的宿主代码带有在某些初始的二进制代码分析时就可以避免的缺陷。记住,有很多方法能够用来确保恶意软件难以</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">发现,这些方法包括变形、多态以及从操作系统最难发现的基于硬件的设备感染。到今天为止,没有人知道这个缺陷到底是不是有意为之,因为分析师们试图更好地</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">理解</span><span lang="EN-US">StormWorm</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">的方法以及背后的意图,所以这一点仍然在安全界中继续讨论。如果这个蠕虫确实计划在全球流行,它的作者可能已经花费更多的时间采用</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">一些更加复杂的技术来确保这个</span><span lang="EN-US">Rootkit</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">更加难以被发现,或者持久地留在受害的主机上。</span></p>



<p class="MsoNormal"><b><font size="3"><span lang="EN-US">1.6.2&nbsp; </span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">变形(恶意软件实例:</span><span lang="EN-US">W32.Evol</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">、</span><span lang="EN-US">W32.Simile</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span></font></b>
</p>



<p class="MsoNormal"><font color="#0000F0"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">变形(</span><span lang="EN-US">metamorphism</span></b></font><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri"><font color="#0000F0"><b>)的恶意软件</b></font>在复制或者传播时发生改变,使得基于特征码的防病毒或者恶意软件删除工具难以识别它。每个变种与原型稍有不</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">同,足以使其生存足够长的时间来传播到其他系统中。变形高度依赖于用于创建变种的算法。如果没有合适的变形算法,就可以采取措施来枚举变形引擎可能出现的</span><span style="font-family: 宋体;">重复。下图说明了变形引擎每次重复时如何改变,使变种恰好足够改变其特征码,避免被发现。</span></p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628466CauU.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628466CauU.jpg" .load="imgResize(this, 650);" ;="" border="0"></a></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">变形引擎不是新生事物,已经使用超过</span><span lang="EN-US">10</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">年了。在一台计算机上对恶意软件进行变异的方法已经得以改进,使得全面清除感染甚至发现恶意软件都非常困难。接下</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">来是一些采用变形的臭名昭著的恶意软件的实例。</span></p>



<p class="MsoNormal"><font color="#0000F0"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">多态(恶意软件实例:</span><span lang="EN-US">W32.Rahack.h</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">、</span><span lang="EN-US">W32.Polip</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">、</span><span lang="EN-US"> W32.Dengue</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span></b></font>
</p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">多态(</span><span lang="EN-US">polymorphism</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)是指采用与原型不同的结构进行自我复制的恶意软件。多态是一种伪装方式,最初被恶意软件编写者用于挫败采用简单字符串搜</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">索以发现主机上恶意软件的防病毒引擎。防病毒公司很快就对这种方法做出反击,但是作为多态核心的加密过程不断地发展,确保了恶意软件具备在安全的主机上的</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">生存能力。下图展示了多态引擎采用的一种典型过程。你可以看到,病毒的每次重复都完全不同。这种技术使防病毒软件更加难以发现恶意软件的重复。第</span><span lang="EN-US">7</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">章中将</span> <span style="font-family: 宋体;">会介绍,防病毒引擎多半依靠查找恶意软件的基本静态代码来发现它,有些时候,也使用行为特征判断方法,试图识别新添加的文件的行为是否类似恶意软件。</span></p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_13106285433SS2.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_13106285433SS2.jpg" .load="imgResize(this, 650);" ;="" border="0"></a>
</p>



<p class="MsoNormal"><font color="#0000F0"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">寡形(恶意软件实例:</span><span lang="EN-US">W95.Sma</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span></b></font>
</p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">这种抗检测技术一般被认为是穷人的多态引擎。这种方法从一组预定义的备选方案中选择一个解密程序。也就是说,这些预定义的备选方案可能用一组有限的解密程</span>
<span style="font-family: 宋体;">序集识别和发现。下图中,你可以看到寡形引擎的局限性以及在病毒实际投入使用时的效率。</span></p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628551fBBl.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628551fBBl.jpg" .load="imgResize(this, 650);" ;="" border="0"></a> </p>



<p class="MsoNormal"><font size="3"><b><span lang="EN-US">1.6.3&nbsp; </span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">混淆</span></b></font> </p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">大部分日常所见的恶意软件都以许多方法进行混淆。最常见的混淆方式是通过压缩或者加密打包代码,这些将在后面的内容中介绍。但是,代码混淆的概念对现在的</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">恶意软件是非常重要的。主机混淆和网络混淆是两种重要的混淆类型,用于同时绕过两种类型的保护措施。</span> <span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">混淆有时候可能是恶意软件崩溃的原因。例如,恶意软件编写者实施了非常剧烈的混淆方法,以至于网络防御者实际上可以使用逃避的技术来创建检测这个恶意软件的特征码。在接下来的内容中,我们打算讨论两种最重要的恶意软件混淆组件:可移植执行体(</span><span lang="EN-US">portable executable</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">,</span><span lang="EN-US">PE</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)打包程序和网络编码。</span></p>



<p class="MsoNormal"><font color="#0000F0"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">存档程序、加密程序和打包程序</span></b></font></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">许多用来保护数据和确保完整性的公用程序也能成功地用于在恶意软件传播时对其进行保护,最重要的是能帮助其避开取证分析。让我们按照变化的顺序,也即存档</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">程序、加密程序和打包程序的顺序来研究一下这些公用程序在感染系统中的使用方法。</span></p>



<p class="MsoNormal"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">存档程序</span></b><span lang="EN-US"><span style="mso-spacerun:yes">&nbsp; </span></span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">在</span><span lang="EN-US">20</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">世纪</span><span lang="EN-US">90</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">年代末,</span><span lang="EN-US">ZIP</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">、</span><span lang="EN-US">RAR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">、</span><span lang="EN-US"> CAB</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">和</span><span lang="EN-US">TAR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">实用程序被用来混淆恶意病毒。为了运行存档程序,必须将其安装在受害主机上,除非恶意软件编写者将这个程序作为装载程序的一部分。这种方法</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">后来很少使用,因为要使恶意病毒运行,就必须解压缩,然后将其移到硬盘上的某个位置,这很容易被防病毒引擎发现并删除。此外,现在的大部分防病毒引擎深入</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">扫描存档文件,以搜索嵌入的执行程序。这种方法有些过时,并且没有得到广泛的使用,原因主要是防病毒扫描程序的成熟及其深入扫描存档文件的能力。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri"><b>加密程序</b>(恶意软件实例:</span><span lang="EN-US"><a href="mailto:W32.Beagle@mm%21enc" target="_blank" target="_blank">W32.Beagle@mm!enc</a></span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span><span lang="EN-US"><span style="mso-spacerun:yes">&nbsp; </span></span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">通常大部分软件开发人员用这些程序来保护应用程序的核心代码。这些核心代码被加密并压缩,使得黑客很难进行逆向工程或者识别应用程序中的函数。实用加密学</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">(</span><span lang="EN-US">Cryptovirology</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)与对恶意软件用来混淆和保护自己以得到长期生存能力的加密过程的研究有相同的意义。历史上,恶意软件实施共享密钥(对</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">称)加密方法,但是一旦数字取证业界识别出这种方法,很容易将其倒推出来,这促进了当前实施的公钥加密。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri"><b>打包程序</b>(恶意软件实例:</span><span lang="EN-US">W32.Beagle@mm!enc</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">现在,几乎所有恶意软件实例都以某种方式采用打包程序,以绕过防病毒或者防间谍工具这些安全软件。简单地说,打包程序是一个用于混淆执行恶意病毒功能的主</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">体代码的加密模块,用于在传输时避开网络检测工具以及基于主机的保护产品。现在的互联网上有数十个可用的公开或者不公开的打包程序。不公开的一次性打包程</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">序最难发现,因为它们没有公开,企业安全型产品不能很容易地识别它们。打包程序和存档工具有明显的不同,普通计算机用户一般不采用这些工具。打包程序一般</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">保护可执行程序和</span><span lang="EN-US">DLL</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">,不需要在受害主机上预先安装任何工具。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">正如黑客的技能水平一样,打包程序也有不同的完备度以及许多功能性选项。打包程序常常能对抗防病毒保护,也能增强恶意软件的隐蔽性。打包程序能够为黑客提</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">供一组健壮的功能,例如发现虚拟计算机并进入使其崩溃、生成很多异常、利用多态代码避开执行防护,以及插入无用指令增加打包后的文件尺寸,从而更难发现等一系列的能力。你一般会在这些无用指令中发现</span><span lang="EN-US">ADD</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">、</span><span lang="EN-US">SUB</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">、</span><span lang="EN-US">XOR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">指令以及对空函数的调用,这些指令用来摆脱取证分析。一般,你还会发现多个文件(例如</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">可执行文件)一起打包或者一起受到保护,其他可执行文件将装载到第一个被解包的文件的地址空间中。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">下图是打包程序过程的一个简单实例。</span>&nbsp;</p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_13106285646056.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_13106285646056.jpg" .load="imgResize(this, 650);" ;="" border="0"></a></p><p class="MsoNormal"><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">使用打包程序最强大的地方是恶意软件不需要访问硬盘,所有程序都作为进程内存运行,这一般能够避开大部分防病毒和基于主机的安全工具。利用这种方法,如果</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">这个打包程序是知名的,防病毒引擎能够在其解包恶意软件时发现它。如果打包程序是不公开或者新型的,那么防病毒软件就不可能避免恶意软件运行,在这次对抗</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">中也就失败了,并且不能触发任何使管理员采取行动的警告。在图</span><span lang="EN-US">1-6</span><span style="font-family: 宋体;">中,你能够清晰地看到,前两年数字取证业界发现的打包程序的数量的增长。</span></p><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628646Zn94.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628646Zn94.jpg" .load="imgResize(this, 650);" ;="" border="0"></a><p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">图</span><span lang="EN-US">1-6 2007</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">~</span><span lang="EN-US">2009</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">年间发现的打包程序</span><br><span lang="EN-US"> </span></p><p class="MsoNormal"><font color="#0000F0"><b><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">网络编码</span></b></font></p>





<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">大部分网络安全工具可以使用网络编码来避开。现在几乎所有企业网络都允许</span><span lang="EN-US">HTTP</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">或者</span><span lang="EN-US">HTTPS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">通过所有网关,所以编码后的恶意软件能够轻易地穿越边界防</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">护系统。下面是一些网络编码方法的实例。</span> </p>
<p class="MsoNormal"><span lang="EN-US">XOR XOR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">是一种简单的加密过程,用于避免网络通信被网络安全设备发现。你一般会发现</span><span lang="EN-US">XOR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">流隐藏在安全套接字层(</span><span lang="EN-US">SSL</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)这样的协议中。这样,如果</span><span lang="EN-US">IDS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">分</span> <span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">析师只进行一次简单的评估,这次通信看上去是加密的,但是进行了深入的封包检测之后,分析师将会注意到这个流不是真正的</span><span lang="EN-US">SSL</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">通信。</span> </p><p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri"></span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri"></span></p><p class="MsoNormal"><span lang="EN-US">XOR</span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">是一种简单的二进制运算,如果两个二进制输入值相等,则输出</span><span lang="EN-US">0</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">;如果不相等,则输出</span><span lang="EN-US">1</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">。</span><span lang="EN-US">XNOR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">正相反,如果两个输入值相等,则输出</span><span lang="EN-US">1</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">;如果两个输入值不同,则输出</span><span lang="EN-US">0</span><span lang="EN-US">。当恶意软件准备执行时,它将通过相反的过程访问数据,运行所编写的实际二进制文件。XOR</span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">和</span><span lang="EN-US">XNOR</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">是快速改变静止或者运行中的数据</span> <span style="font-family: 宋体;">以避开检测方法的简单引擎。</span></p><p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628652if5z.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_1310628652if5z.jpg" .load="imgResize(this, 650);" ;="" border="0"></a>
</p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">大部分聪明的恶意软件编写者不会采用存档程序来进行编码,因为大部分企业网关应用程序能够解码各种公用的存档程序。在网络中虽然可以实现存档保护的恶意软</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">件的分段传输或者</span><span lang="EN-US">“</span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">断续</span><span lang="EN-US">”</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">的传输,但是如果恶意软件的任意部分被识别出来,它将被从系统中清除,这样恶意软件就无法被组合成编写者所希望的整体。</span>
</p>



<p class="MsoNormal"><b><font size="3"><span lang="EN-US">1.6.4&nbsp; </span><span style="font-family:宋体;
mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">动态域名服务(恶意软件实例:</span><span lang="EN-US"><a href="mailto:W32.Reatle.E@mm" target="_blank" target="_blank">W32.Reatle.E@mm</a></span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)</span></font></b>
</p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">动态域名服务(</span><span lang="EN-US">Dynamic Domain
Name Services</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">,</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)是黑客们最新的发明,而最先它是使企业管理员能够快速地在网络中增加机器的一种管理性改进。当</span><span lang="EN-US">Microsoft</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">在其活动目</span> <span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">录企业版系统中实现</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">,并将其作为一种快速将机器上线和离线的情况通知网络上的其他计算机的手段时,</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">就为人们所熟知了。</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">使恶意软件</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">能够进行外部联网和匿名操作而不用担心归属地被发现。</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">是一种域名系统,它的域名</span><span lang="EN-US">IP</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">解析可以实时更新,一般在几分钟内就能完成。域名的宿主名称服务器几乎始终保持着指挥控制服务器的缓冲记录。但是,(被入侵的</span><span lang="EN-US">/</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">受害)主机的</span><span lang="EN-US">IP</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">地址可以在任何地方并且可以随时移动。将域的缓冲限制在很短的时间内</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">(几分钟),可以避免其他名称服务器节点缓冲原始主机的旧地址,确保受害者使用恶意软件编写者控制的名称服务器进行解析。</span> </p>



<p class="MsoNormal"><font size="3"><b><span lang="EN-US">1.6.5&nbsp; Fast Flux</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">(恶意软件实例:</span><span lang="EN-US">trojan.peacomm) </span></b></font></p>



<p class="MsoNormal"><span lang="EN-US">Fast Flux</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">是当前的僵尸网络、恶意软件和仿冒方案最常用的通信平台,通过一个不断变化的被侵入代理主机的网络,可用此平台传递内容和指挥控制。对等网络拓扑</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">结构也能够将</span><span lang="EN-US">Fast Flux</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">作为遍及多个指挥控制服务器的指挥控制框架,像菊花链一样传递信息而不用担心被发现。</span><span lang="EN-US">Fast Flux</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">和</span><span lang="EN-US">DDNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">很相似,但是速度更快,想要抓住恶意软件背后的编写者和策划者将会更加困难。我们前面提到的</span><span lang="EN-US">StormWorm</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">就是很好地利用这一技术的一个新型恶意软件变种。图</span><span lang="EN-US">1-7</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">展示了两种形式的</span><span lang="EN-US">Fast Flux</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">:</span><span lang="EN-US">Single-Flux</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">和</span><span lang="EN-US">Double-Flux</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">。在这张图中,你能看到受害者之间的</span><span lang="EN-US">Single-Flux</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">和</span><span lang="EN-US">Double-Flux</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">的简单过程,以及每种方法的查找过程。</span>
</p>



<p class="MsoNormal"><span lang="EN-US">Single-Flux </span></p>



<p class="MsoNormal"><span lang="EN-US">Fast Flux</span><span style="font-family:
宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">的第一种方式一般在一个网络中包含多个节点来登记和注销地址。这种方式一般与用于单个</span><span lang="EN-US">DNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">条目的一个</span><span lang="EN-US">DNS A</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">(地址)记录相关,并且为单一域名生成一个变动的目标地址列表,这个列表的条目数可能从几百到几千条。一般来说,</span><span lang="EN-US">Single-Flux DNS</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">记录的生存时间(</span><span lang="EN-US">TTL</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">)设置得非常短,以确保记录不会被缓冲,地址能够快速地移动而不用担心被记录。</span>
</p>



<p class="MsoNormal"><span lang="EN-US">Double-Flux </span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">第二种形式的</span><span lang="EN-US">Fast Flux</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">的实现要困难得多,虽然和</span><span lang="EN-US">Single-Flux</span><span style="font-family:宋体;mso-ascii-font-family:
Calibri;mso-hansi-font-family:Calibri">相似,但是多台主机并不是组成一个登记和注销</span><span lang="EN-US">DNS A</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">记录的网络,而是组成一个名称服务器的网络,登记和注销生成</span><span lang="EN-US">DNS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">分区列表的</span><span lang="EN-US">NS</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">记录。如果一个节点被发现,这种实现确保恶意软件具备一个保护层和生存能力。你一般会看到被侵入的主机在名称服务器网络中作为代理,将这些主机埋藏到一个代理网络中,有助于保护执行指令的恶意软件网络的身份。由于代理的数量很多,完全可能保护恶意软件编写者,这也就增加了恶意软件系统的生存率,甚至超过了放置在合适位置用于避免受侵害主机访问多个可能的指挥控制点的</span><span lang="EN-US">IP</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">块的能力。</span> </p>



<p class="MsoNormal"><a href="http://blog.chinaunix.net/attachment/201107/14/18942516_13106289129tKn.jpg" target="_blank" target="_blank"><img src="http://blog.chinaunix.net/attachment/201107/14/18942516_13106289129tKn.jpg" .load="imgResize(this, 650);" ;="" border="0"></a><span style="font-family: 宋体;"><br></span></p><p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">图</span><span lang="EN-US">1-7 Single-Flux </span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">和</span><span lang="EN-US">Double-Flux </span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">要记住,攻击者只需要一个方向就能对你发动攻击,而防御者需要知道并且保护所有的方向,谁的成功几率更大?在这个领域警惕性是必须的。</span></p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">由于利益的关系,过去</span><span lang="EN-US">10</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">年中为了简化管理员工作所添加的路由和网络服务功能正被不法分子利用。除了对你的用户进行全面的培训和教育,让他们在没有真正得</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">到信任的邮件发送者的确认之前,不要打开邮件或者附件(即使这些邮件的来源受到信任)之外,对这些技术没有更好的防范措施。这么总结起来有些伤心,但是现在你的用户是最后一条防线。如果他们没有得到进行简单分析的培训,你的网络就会因为我们已经讨论过的这些传播方式而遭到失败。要注意,现在的用户还没有能</span>
<span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:
Calibri">够快速地由电子邮件附件中接收到的域名验证域名和</span><span lang="EN-US">/</span><span style="font-family:宋体;mso-ascii-font-family:Calibri;mso-hansi-font-family:Calibri">或真实性的工具。有些企业工具能够鉴定真实性,但是执行真实性验证所需的时间对于日常商业运作来说成本可能太高。</span>
</p>



<p class="MsoNormal"><span style="font-family:宋体;mso-ascii-font-family:Calibri;
mso-hansi-font-family:Calibri">现在我们来到了本章中有趣的一部分</span><span lang="EN-US">……</span></p>
页: [1]
查看完整版本: 现代恶意软件的传播技术