官术网_书友最值得收藏!

Media storage

Network administrators are very restrictive when it comes to using thumb drives. The primary reason is that external storage devices, such as USB thumb drives, CDs, DVDs, external hard drives, and even smartphones are all media in which malware can store itself. Once a storage device gets mounted to a computer, it serves like a regular drive. Malware can simply drop copies of itself to these storage drives. Similar to network worms, these are worms that depend on the user to run the malware. But with the Windows Autorun feature turned on, malware may execute once the drive is mounted, as can be seen in the following screenshot:

The previous image is the default dialog encountered when inserting a CD drive containing setup software.

The autorun.inf file in the root of a drive contains information on which file to automatically execute. This is used by software installers stored in CDs so that, when the disk is inserted, it automatically runs the setup program. This is abused by malware by doing these steps:

  1. Dropping a copy of its malware file in removable drives
  2. Along  with its dropped copy, it generates an autorun.inf file that points to the dropped executable file, as can be seen in the following example:

The autorun.inf for the VirtualBox setup autoplay dialog shown previously contains the text as shown in the previous screenshot. The open property contains the executable to be run.  

主站蜘蛛池模板: 山东省| 灵宝市| 望谟县| 安庆市| 天柱县| 高邮市| 渝北区| 叙永县| 金沙县| 加查县| 芜湖市| 色达县| 张家港市| 舟山市| 同心县| 沾化县| 抚顺县| 牡丹江市| 丰顺县| 普洱| 将乐县| 汶上县| 澄城县| 扶余县| 汉寿县| 高邮市| 怀宁县| 安达市| 望谟县| 蓬溪县| 丰原市| 田林县| 遵义市| 九龙坡区| 吉安县| 石河子市| 资阳市| 绵竹市| 大安市| 保康县| 长春市|