Frontiers of Information Technology (2011)
Dec. 19, 2011 to Dec. 21, 2011
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/FIT.2011.34
Nowadays cyber security is becoming a great challenge. Attacker's community is progressing towards making smart and intelligent malwares (viruses, worms and Root kits). They stealth their existence and also use administrator rights without knowing legal user. Stuxnet worm is an example of a recent malware first detected in July 2010. Its variants were also detected earlier. It is the first type of worm that affects the normal functionality of industrial control systems (ICS) having programmable logic controllers (PLC) through PLC Root kit. Its main goal is to modify ICS behavior by changing the code of PLC and make it to behave in a way that attacker wants. It is a complex piece of malware having different operations and functionalities which are achieved by exploiting zero day vulnerabilities. Stuxnet exploits various vulnerable services in Microsoft Windows. In this paper we will show real time simulation of first three vulnerabilities of these through Metasploit Framework 3.2 and analyze results. A real time scenario is established based on some assumptions. We assumed Proteus design (pressure sensor) as PLC and showed after exploitation that the pressure value drops to an unacceptable level by changing Keil code of this design.
Stuxnet, Programmable Logic Controllers, Print Spooler, Backtrack, Metasploit Framework
Zahid Anwar, Rahat Masood, Um-e-Ghazia, "SWAM: Stuxnet Worm Analysis in Metasploit", Frontiers of Information Technology, vol. 00, no. , pp. 142-147, 2011, doi:10.1109/FIT.2011.34