官术网_书友最值得收藏!

Media storage

Network administrators are very restrictive when it comes to using thumb drives. The primary reason is that external storage devices, such as USB thumb drives, CDs, DVDs, external hard drives, and even smartphones are all media in which malware can store itself. Once a storage device gets mounted to a computer, it serves like a regular drive. Malware can simply drop copies of itself to these storage drives. Similar to network worms, these are worms that depend on the user to run the malware. But with the Windows Autorun feature turned on, malware may execute once the drive is mounted, as can be seen in the following screenshot:

The previous image is the default dialog encountered when inserting a CD drive containing setup software.

The autorun.inf file in the root of a drive contains information on which file to automatically execute. This is used by software installers stored in CDs so that, when the disk is inserted, it automatically runs the setup program. This is abused by malware by doing these steps:

  1. Dropping a copy of its malware file in removable drives
  2. Along  with its dropped copy, it generates an autorun.inf file that points to the dropped executable file, as can be seen in the following example:

The autorun.inf for the VirtualBox setup autoplay dialog shown previously contains the text as shown in the previous screenshot. The open property contains the executable to be run.  

主站蜘蛛池模板: 安庆市| 佛冈县| 崇左市| 平果县| 马公市| 合水县| 玉林市| 大石桥市| 政和县| 龙海市| 晋中市| 陇南市| 若尔盖县| 甘谷县| 湖北省| 金山区| 涿州市| 福泉市| 衡阳县| 阜新市| 江山市| 大安市| 黎城县| 大悟县| 漾濞| 宁乡县| 夏邑县| 青河县| 永定县| 黔江区| 吉水县| 白银市| 法库县| 奉节县| 汽车| 突泉县| 巴楚县| 故城县| 黄浦区| 汤阴县| 邛崃市|