1.2 Malware & common attacks Flashcards

1
Q

What is a malware?

A

malicious software, can aim at gather information or take control of your computer and make it a botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different type of malware?

A
  • viruses
  • crypto-malware
  • worms
  • trojan horse
  • rootkit
  • keylogger
  • adware/spyware
  • botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to get a malware?

A

can be dl via a click on an email, or via web page pop up, or via a vunerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

a malware that can reproduce itself through file systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the different virus type ?

A
  • program viruses (in applications)
  • boot sector viruses (when the OS boot)
  • script viruses
  • macro viruses (inside a macro in microsoft office)
  • fileless virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a fileless virus?

A

type of malware that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, making it hard to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How fileless malware work?

A

1/user click on malicious website link
2/ website exploit a vulnerability
3/ launch powershell and dl payloads in RAM
4/ run powershell script and exec in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a worm?

A

type of malware that self replicated and self spread through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How a worm can be detected?

A

by a firewalls and IDS/IPS before the infection, the worm should be signature based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a ransomware?

A

malware that employs encryption to hold a victim’s information at ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is crypto malware?

A

same as ransomware, the data are encrypted and the ransom needs to be paid if you want the data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to protect against ransomware

A
  • have a backup
  • update OS
  • update apps
  • update antivirus/malware to get the latest signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is trojan horse?

A

software that pretend to be something else and in reality you are installing a malware, once it is inside in can open backdoor or dl file etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a PUP

A

Potentially Uwanted Software that can be dl by a trojan (eg agressive browser toolbar, unwanted ad etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a backdoor?

A

can be open thans to a malware. It is a undocumented way of gaining access to a computer without having to redo the whole attack for the hacker. SOme software like Linux includ backdoor to the kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent a trojan?

A
  • update antivirus with the lates signature
  • have a backup
  • don’t click on unknown link
17
Q

What is a rootkit?

A

type of malware that give access and modify file on the kernel (and not the OS), it can be invisible

18
Q

Is a rootkit can be identified?

A

yes some antivirus can and software that secure boot exists

19
Q

what is a spyware?

A

type of malware that steals sensitive info and gather data. It can analyse the activity on internet and use keylogger to capture credential once the victim log in a website. It can be install via a trojan

20
Q

how to protect against spyware/adware?

A
  • antivirus/anti malware with latest signature
  • know exactly what you are installing
  • do backups
21
Q

What are bots?

A

type of malware that infects a device to make it a bot remotely contolled by the hacker

22
Q

what is botnets ?

A

a group of bots working toghether. It can be used to do DDos, relay spam, proxy network traffic

23
Q

How to prevent for bot ?

A
  • update OS
  • update antivirus/malware
  • identify an existing infection
  • prevent command and control (block at firewall, IPS)
24
Q

what is a logic bomb?

A

type of malware that is triggered when a logical condition is met such as after a number of transactions have been processed, or on a specific date. Difficult to spot cos logic bomb can delete themselves and no signature predefined in antivirus

25
Q

How to prevent from logic bomb?

A
  • Formal change control & procedure (is there a process in place for change in the server?)
    -host based intrusion dection
  • constant auditing of systems
26
Q

What is the best way to store a password?

A

by hashing that it irreversible

27
Q

what is a spraying attack (this is not malware)

A

when an attacker uses common passwords to attempt to access several accounts on one domain. Using a list of common weak passwords, such as 123456 or password1, an attacker can potentially access hundreds of accounts in one attack. it avoid the account to be locked

28
Q

What is a bruteforce attack?

A

try every possible password combination until the hash matches the password’ hash. It can be detected and the account can be locked

29
Q

What is a dictionnarry attack ?

A

use a dictionary to find common words, many wordlists are available on the internet

30
Q

What is a rainbow table?

A

an optimized, pre-built set of hashes stored in a table and help to find hashes corresponding to a password

31
Q

what is “adding a salt”

A

it refers to adding random data to a password when hashing so that it can be easily unshash via a rainbow table, it slow the bruteforce attack (e.g. password +MeNvg)

32
Q

What are the different type of physical attacks?

A
  • malicious USB cable: cable which perform unwanted function once connected (dl malware, data exfiltration, gps tracking etc). Often detected as mouse or keyboard by computer
  • malicious usb flash drive: USB infected with malware that are dl once connected to pc
  • skimming: stealing credit card info during a normal transaction
  • card cloning: cloning a credit card
33
Q

what is poisoning the training data attack?

A

it is a type of attack directed to machine learning. As ML require a lot to data for the AI to function,, an attacer can confuse the AI by sending modified data

34
Q

What is the difference between cloud based and on premises attack?

A
  • cloud: security is centralized and costs less
  • onpremises: security and infra cost on the client
35
Q

what are cryptographic attacks?

A
  • collision: 2 plaintext created the same hash value
  • downgrade attack: scenario in which a malicious actor attempts to force a server or client to use a lower version of a cryptographic protocol (such as TLS or SSL), a cipher suite (such as an export-grade cipher, instead of a standard one), or a connection type (HTTP, instead of HTTPS)