11.1 viruses and internet worms Flashcards
Virus
infection of an existing program that results in modification of behavior
Worm
code that propogates and replicates across the network
Viruses do not require user activity to spread
false, they do dumbass
Worms propagate automatically
true dawg
Different types of viruses
Parasitic: infects executable files
Memory-resident: infect running programs
Boot sector: spreads when system is booted
Polymorphic: encrypt part of virus program using randomly generated key
Worm lifecycle
- Discover/scan for vulnerable hosts
2. Infect vulnerable machines via remote exploit
what was the first worm
morris worm
morris worm
no malicious payload, but slowed down machines it was on by spawning processes
Looked to crack passwords
Spread by: remote shell execution, buffer overflow/remote exploit
Worm design general approach
- Scan: find vulnerable hosts
- Spread
- Remain undiscoverable
First modern worm
Code Red1
Code red1
2001
exploited microsoft buffer overflow
randomly spread over a 20 day period each month
code red 1 vs code red 2
same vulnerability, different payload
zero day attack
when a worm first appears in the wild
worm infection rates
can be exponential
Increasing intial compromise rate
- Create a hit list: list of vulnerable hosts
2. Permutation scanning: shared permutation of IP address lists.