2-5 Flashcards
simple tool to use. you select the target, agent, how many sockets, the requests then start the flood
DoSHTTP
first appeared in July 2012, affects windows 95 to windows 7, and windows server 2003. this was a ________ antovirus
fake antivirus or fake AV
first appeared in 2012, targets windows OS. it was specifically designed for espionage. spyware that can monitor network traffic and take screenshots. found on Iranian govt sites.
flame
sco has close ties to
microsoft
sco tried to sue distributors of linux claiming there OS’s contained segments of SCO Unix code. the suit was _________
unfounded
a cirus that creates a peer-to-peer botnet.. it establishes encrypted communications between the command and control computer and the infected computer.
gameover zeus
sirts seen in 2013, well known ransomeware that uses asymetric encryption to lock a users files
cryptolocker
ransomeware first seen in 2014, similar to cryptolocker, it would communicate with the command and control server and even take screenshots
cryptowall
cariation of cryptowall. can steal credentials from infected system
TSPY_FAREIT.YOI
no garaunteed way exists to prevent all DOS attacks. first this you need to do is figure out how the attack was perpetrated. next would be to refuse _____ packets from outside your network.
ICMP
a technique used to gain access to users computers. occasionally done simply to mask the origins of a DOS attack
spoofing
intruder sends messages to acomputer system with an IP address indicating thatit came from another IP addressthen it actually came from
spoofing
an attacker must find a machine that the target system trusts. next the attacker must modify the packet header of their transmission so it appears it came from that host.
spoofing
the idea of IP spoofing was first theorized in the 1980’s by Robert morris when he discovered the weakness in _________ protocol
TCP