malicious software Flashcards

(17 cards)

1
Q

what is a botnet

A

a network of compromised machines acting as a network

  • responsible for things such as large scale network probing
  • launching ddos
  • spam
  • click-fraud campaigns
  • info theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a trojan horse

A

a program appearing as a regular program but hides malicious activity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a webroot

A

a dll based attack; spreads via drive by downloads; sophisticated rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what was the torpig botnet

A

it was a combination of a mebroot and a trojan horse that was distributed bia mebroot via drive by downloads and a sophisticated rootkit.

It injected into 29 software platforms to steal sensitive information, used http injection for phishing, encrypted http as command and control protocol, and used a resilient approach “domain flux”; to contact command and control center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how do you go about in beggining to understand and contain malicious software

A

Principle 1: the hijacked botnet should be operated so that any harm
and/or damage to victims and targets of attacks would be minimized
Always responded with okn message
Never sent new/blank con guration le
Principle 2: the sinkholed botnet should collect enough information to
enable noti cation and remediation of a ected parties
Worked with law enforcement (FBI and DoD Cybercrime units)
Worked with bank security ocers
Worked with ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a sinkholed botnet

A

a bot net that is controlled by “good guys”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

where do most malicipous threats start

A

the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malicious webpage does what to gain arbitraty code execution

A

leverage of a defect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is malicious software

A

(Malware) refers to any unwanted software and executable code that is used
to perform an unauthorized, often harmful, action on a computing device. It
is an umbrella-term for various types of harmful software, including viruses,
worms, Trojans, rootkits, and botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which two malicious software are self spreading

A

virus/worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which five malicious software are non-spreadomg

A

root-kit, trojan horse, dialer, spyware, keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which 3 malicious software require a host

A

virus, root-kit and

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which 4 malicious software do not require a host

A

trojan, dialer, spyware, keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a virus

A

Self-replicating
Needs a host to infect
Boot (Brain virus), overwrite, parasitic, cavity, entry point obfuscation,
code integration (W95/Zmist virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

whats a worm

A

Self-replicating, spreads (autonomously) over network
Exploits vulnerabilities a ecting a large number of hosts
Sends itself via email
e.g., Internet worm, Netsky, Sobig, Code Red, Blaster, Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

whats atrojan

A

Malicious program disguised as a legitimate software

Many di erent malicious actions

17
Q

whats a rootkit

A

Used to keep access to a compromised system
Usually hides les, processes, network connections
User- and kernel-level