11.1 viruses and internet worms Flashcards

1
Q

Virus

A

infection of an existing program that results in modification of behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

code that propogates and replicates across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Viruses do not require user activity to spread

A

false, they do dumbass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms propagate automatically

A

true dawg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different types of viruses

A

Parasitic: infects executable files
Memory-resident: infect running programs
Boot sector: spreads when system is booted
Polymorphic: encrypt part of virus program using randomly generated key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm lifecycle

A
  1. Discover/scan for vulnerable hosts

2. Infect vulnerable machines via remote exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what was the first worm

A

morris worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

morris worm

A

no malicious payload, but slowed down machines it was on by spawning processes
Looked to crack passwords
Spread by: remote shell execution, buffer overflow/remote exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm design general approach

A
  1. Scan: find vulnerable hosts
  2. Spread
  3. Remain undiscoverable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

First modern worm

A

Code Red1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Code red1

A

2001
exploited microsoft buffer overflow
randomly spread over a 20 day period each month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

code red 1 vs code red 2

A

same vulnerability, different payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

zero day attack

A

when a worm first appears in the wild

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

worm infection rates

A

can be exponential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Increasing intial compromise rate

A
  1. Create a hit list: list of vulnerable hosts

2. Permutation scanning: shared permutation of IP address lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Slammer worm

A

2003
buffer overflow in microsoft sql server
entire code fit into one UDP packet
caused 1.2 billion dollars in damage