11.1 - Internet Worms Flashcards

1
Q

An infection of an existing program that results in the modification of original programs behavior. Typically require user action to spread (pen attachment on email, or runninng an exe that a friend gave on a USB key) - user intervention

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Code that propagates and replicates itself across the network. Usually spread by exploiting flaws in existing programs or open services. Propagate automatically - scanning to spread automatically

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infects an existing executable file

A

parasitic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

infects running programs

A

memory-resident virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

spreads when system is booted

A

Boot-sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encrypt part of virus program using randomly generated key

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First internet worm

A

Morris worm, 1988
Had no malicious payload but exhausted resources
effected 10% of all internet hosts
standard buffer overflow exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Quiz:

Main difference between a worm and a virus?

A

Worms can spread automatically

Both worms and viruses can have destructive payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

worm life-cycle

A

1) Discover/”scan” for vulnerable hosts

2) Infect vulnerable machines via remote exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worms exploit through multiple vectors in order to spread faster

A

Vectors

1) remote shell execution/weak passwords
2) buffer overflow /remote exploit
3) debug in sendmail (smtp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General approach of a worm

A

1) Scan to find a vulnerable host
2) Spread to other vulnerable hosts
3) Remain undetected - undiscoverable to continue to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quiz:

What are the three steps in a worm’s “life cycle”?

A

1) Scans for vulnerable hosts
2) Infects them
3) remains undetected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 major worm outbreaks in 2001

A

1) Code red I v2
2) Code red II
3) Nimda

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero Day attacks

A

An exploit directed at a zero-day is called a zero-day exploit, or zero-day attack. In the jargon of computer security, “Day Zero” is the day on which the interested party (presumably the vendor of the targeted system) learns of the vulnerability.

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Random constant spread

A

K: initial compromise rate
N: # of vulnerable hosts
a: Fraction of hosts already compromised

Nda = (Na)*K(1-a) dt

a = e^K(t-T)/1+e^K(t-T)

If you want to design a fast spreading worm you need a high compromise rate (K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to increase the compromising rate

A

1) Create a Hit List: List of vulnerable hosts (gets rid of that flat part of the curve that is most dormant)
2) Permutation scanning: Shared permutation of IP address lists. Starts from own IP and work down.

*The Slammer worm (Jan 2003) used thiese techniques
-> entire code fit into one UDP packet! (connectionless!)
Caused 1.2 billion dollars in damage
No payload - just bandwidth exhaustion
All this damage inflicted in just 30 minutes

17
Q

Quiz:

What allowed the Slammer work to spread so quickly?

A

1) UDP - connectionless transport

2) Could fit in a single packet