1.2 Flashcards
Malware types
To gather keystrokes,
to control com and install into a bot and have that com to join the bad bot net,
For advertisment
For random ware
Virus
Malware can reproduce but needs user to start process
Program virus launches by clicking
Boot sector virus, starts when start OS
Script virus
Macro virus in apps
Fileless virus, stealth attacks and can evade scanners, written to memory not Hd, comes from clicking links
Worms
No user input needed. Takes advantage of vulnerability or network connectivity. Can spread quickly, can be stopped with firewall to stop communication
Ransomware crypto-malware
Taking valuable personal or corporate data, restricting that data and require some payment for unlocks
Crypto malware encrypts info that requires a key for recovery
How to protect?
Backups on a offline location
Updates full security
Trojans and rats
Fake software looking like the real software. Once installs makes back doors.
Potentially unwanted programs (pup)
Undesired software installed with other software such as a back up utility, browser hijacker’s or unwanted bookmark bar
Remote access Trojan
Entering through back door, to gain complete control remotely and control anything’s, collect logs, copy files, run more malware and programs
Rootkit
Modifies in kernel of operation system, the building blocks the foundations for the OS. combo rootkit and malware
To both impossible delete and then take important info
Secure boot protects this
AdwareSpyware
Adware Com becomes one big ad banner, slowing computer, can be installed with other
Programs.
Spyware taking capture browsing habits, key logs
Bots and botnets
Infects OS through Trojan or PUp and connects to other computers via a command and control server. Then the whole system working together can create a DDos, proxies for spam
Logic. Bomb
Usually someone with a grudge or ex emoloyee like a time bomb that
Triggers at a certain time or user
Event. Difficult to identify.
Password attacks
An app that stores pw and gets hacked.
Best to hash
Example a spraying attack such as using common passwords for a quick check
Brute force attack
Uses all combinations of password to find the match. Works with username and password hashes as well. They will create their own hash to determine if it matches the hash of the hash they hacked
Dictionary attack
Uses common words and checks passwords against possible combos with password letter substitutions as well.
Rainbow table
Uses a lot of hashes from previously to cross check any existing known hashes
Can add salt to hashes to make similar
Passwords with diff hashes