! 

Assignment #4

Type of assignment: This assignment should be done in groups.

Note: The assignment submission should clearly list the student members of the group, their names, and student numbers on the first page.

Points: The maximum number of points for this assignment is 70, which will be prorated accordingly after all assignments are posted. Weight of each problem is in parenthesis.

Format:

  1. Assignment submissions are accepted in the following formats only: HTML (extension .html), PDF (.pdf), ASCII text (.txt). Assignments submitted in any other format will be discarded. All text in the assignment submissions must be typed and figures plotted to be easy to read and understand. Spelling, grammar, and other language errors will result in fewer points credited to the corresponding problem solutions.
  2. Your submission file should be named to reflect the group number (see group number assignments below), and the assignment number, e.g., group53-4.pdf.

Problems

  1. (15) (Malicious Logic): Pick one of the following malicious software (malware):

                1. Wanuk.A
                2. Cabir.A
                3. Wisdoor.N
                4. Commwarrior.Q
                5. PcClient.YW
                6. Skyperise
                7. Cardblock
                8. Lasco.A
                9. Luder.A
                10. Mytob.gen@MM
                11. Sasser
                12. Opanki
                13. SpotFace
    1. Post a message (one message per group) in the course WebCT discussion topic named "Malware" indicating which malware your group has picked.
    2. If another group posted an earlier message indicating that they had picked the same malware as your group, go back to step 1 and pick "free" malware.
    3. Classify the picked malware according to the classification discussed in class.
    4. Analyze the design of the picked malware, i.e., its structure, behavior, mechanisms it uses for selecting victims, infecting them, hiding itself and its authors, etc.
    5. Based on your analysis, recommend short, medium and log term countermeasures (i.e., protection and detection techniques) against the threat posed by this malware. Classify your techniques using material from the corresponding course session.
    6. Cite all your sources of information.
    7. Use no more than 4 pages to write a short report (with proper title, authors, abstract, introduction, body, conclusion, and references section) in format of IEEE Transactions documenting your findings obtained in steps 4--6. Use figures and tables, if necessary to achieve better impact of your report.
    8. Post your report in PDF on WebCT discussion topic named "Malware" by the same deadline as the one for this assignment. Marks for late reports will be decreased, 1% of the problem mark per each minute after the deadline.
  1. (7) (Audit): For the malware chosen in the previous problem, suggest (a) logging (i.e., what should be written into the log) and (b) auditing requirements (i.e., on which condition should an analyzer trigger alarm) to detect attack(s) by the malware. Explain your answer.

  2. (48) (Development of Secure Software): Each group is to complete successfully as many lessons as it can by logging in http://webgoat.ece.ubc.ca/WebGoat/attack with the corresponding user name and password from the following table. Groups cannot help each other. If it is found out that one group received help from another group, both groups will receive zero points for this problem even if one of them is eligible for the bonus points (see below). One point per completed lesson will be credited for this problem. The lessons are on learning about common vulnerabilities of Web applications. Some of these vulnerabilities are common to many other types of software applications.

    Important rule: WebGoat source code cannot be examined in order to complete this question.

    Helpful hints to help you with the assignment:
    1. You can access webgoat.ece.ubc.ca only from the UBC network. To access it from outside of the UBC network, you need to use VPN (see www.vpn.ubc.ca for instructions). If on campus, use an IAPv2 port, which can be found in various buildings, including MacLeod and the Libraries. Direct your questions about IAPv2 port to ECE IT services.
    2. Install personal copy of WebGoat on your computer(s) so that you restart WebGoat whenever it crashes because of your actions. webgoat.ece.ubc.ca will crashes too often if each group will be trying to attack it while doing this assignment.
    3. If you cannot access webgoat.ece.ubc.ca because, for example, your or another group crashed WebGoat, send e-mail asking to reboot WebGoat on webgoat.ece.ubc.ca to help@ece.ubc.ca. The course teaching staff does not have privileges to reboot WebGoat on that host.

      Only the report card on webgoat.ece.ubc.ca is what counts for marks.
    1. group members
      username
      password
      Tik Ning Cheung, Jeannie Li, Henry Ng
      group01
      IGqapd
      Ankit Jain, Jason Kuo, Jordan Soet, Brian Tse
      group02
      qhtcwD
      Armin Bahramshahry, Hesam Ghasemi, Anish Mitra, Vinayak Morada
      group03
      eSphw4
      Daniel Dmytriw, Neale Genereux, Michael Gujral, Abhishek Valaboju
      group04
      ERxQPU
      Andre Gagne, Raymond(Kinwai) Lo, Ireti Fakinlede, Gary Tu
      group05
      YrUyBv
      Jue Ni, Vincy Tang, Wynne Lui
      group06
      Q8eAX5
      Jason Kwan, Justine Lu, Safinaaz Rawji, Sophie Ke
      group07
      tGT9Eo
      Willian Ha, Eric Ma, Antony Mbugua, Dickson Poon
      group08
      17vMNU
      Gurpreet Dosanjh, Brody Lodmell, Alexander Van Der Star, Shane Wang
      group09
      50u0MB
      Andrew Lee, Timothy Lui, Bryon Leung
      group10
      FtyQ5q
      Owen Yang, Alice Ho Yu Au-Yeung, Hootan Ziyaeimatin, Florence Tabamo
      group11
      mSmw62
      Michael Kang, Oscar Plag, Brian Lee
      group12
      7qEYag


  3. (18 points) (Bonus questions) First group who can also complete the challenge of attacking three "hackable" admin interfaces and post a message on the course WebCT discussion topic "Assignments" indicating that it completed the challenge will receive additional (i.e., bonus) 18 points for this assignment. The group will have to demonstrate to the course TA the technique of accomplishing the challenge before the credit will be dispensed. If the group fails to demonstrate, the second group will become eligible for the bonus.

    Important rule: WebGoat source code cannot be examined in order to complete this question.

Copyright © 2003-2005 Konstantin Beznosov