3) Rootkits, Web Threats and Internet Forensics Flashcards

1
Q

What are rootkits?

A

Programs/malware with the main goal to gain access to the infected system without being detected. Hides from OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of rootkits do exist?

A

User mode: Runs in ring 3 of the OS. Can only hide itself from other ring 3 applications (like explorer.exe) but not from kernel mode applications.

Kernel mode: Runs at least partially in kernel mode (ring 0). Much more powerful than user mode rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by Hooking?

A

Hooking is the interception of system calls or messages / events sent between other programms and / or software components. Example: keylogger that sits between Keyboard and Computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ways to find Rootkits?

A
  • Run AV scan to find obvious rootkits
  • Compare User Level view with kernel level view by running key API calls and compare results.
  • Look for OS hooks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some Rootkit Detection Tools.

A

Rootkit scanners are: Rootkit buster, GMER, RootRepeal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the problem with rootkits and Windows x64?

A

Win x64 only accepts digitally signed drivers to access kernel mode. Rootkits developers are not able to sign their malicious code. Switch to bootkits. A bootkits tries to intercept the startup routine of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the goal of Web Attacks?

A

Place a malicious piece of software on the victims computer or get access to sensitive information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two major categories of web exploits?

A

Exploits against browser or exploits against browser plugin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the four steps how an attack work.

A
  • Passively analyse the victims browser to find out which exploit kit works best.
  • Find vulnerability in the browser where malicous shell code can be place.
  • Execution of shell code.
  • Shell code normally downloads key payload.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List a few ways how to hide web attacks.

A
  • iframe
  • iframe with zero size
  • JS with document.write() function
  • JS with escape/unscape function to encode ASCII letters eval function
  • fromCharCode() translates ASCII numbers to ASCII characters
  • argument.callee function of JS. Reference to itself. Used to check with modification where performed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name two actions a malicious hop does.

A

REDIRECT or EXPLOIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do attackers obfuscate JavaScripts?

A
  • Write code on one line
  • Use document.write() function to put together code snippets (a+b+c)
  • Usage of escape function
  • Eval function
  • fromCharCode()
  • Use strange / random variables
  • Spaghetti code
  • Functions within functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are useful steps in analyzing obfuscated JavaScripts?

A
  • Re-define document.write or eval function at the beginning of the script
  • Change document.write to alert
  • Write out document.write into a textarea
  • Use online/offline deobfuscation tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the eval function do?

A

It checks if the function is a real JavaScript and then executes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by escape/unescape?

A

Translate characters from letters to ASCII code and back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the fromCharCode() function do?

A

Translates ASCII numbers to ASCII letters.

17
Q

Name a few tools to deobfuscate JavaScript.

A

Revelo, JavaScript Beautifier, CyberChef

18
Q

With what can the document.write function be replaced? Give a few examples.

A

alert or textarea

19
Q

What does the function argument.callee()?

A

It will return back the content of the function itself. Attacker can check if code has been tampered (checking length, iterate through all characters in the function). => integrity checks.

20
Q

What is Maltego?

A

Maltego is data visualising tool for open source intelligence gathering. It shows in a graph reletationships of various entities and can also run automated queries for information gathering (transforms).

21
Q

What are the most common DNS record types?

A
  • A
  • AAAA
  • CNAME
  • PTR
  • MX
  • NS
  • SOA
  • SRV
  • TXT
22
Q

Name so Google Advanced search parameters.

A
  • intitle
  • intext
  • inurl
  • ext
  • filetype
23
Q

How can we find out site visited by a particular company with Maltego?

A

Find public IP range (via MX records). Look for any websites where this IP is stored (in changelog for example)

24
Q

Describe how an attacker could use an Open Source Intelligences approach with tools such as Google, Pipl and Maltego to map a list of important employees in an organisation as the first phase in a targeted attacks.

A

First phase information / intelligence gathering about target person and their relationsship. There is a lot of information available not only via Google but also on social media site. Find alias of a person. The more information present the better will be a targeted attack (CEO fraud) or a social engineering attack.

25
Q

How can you find any other malicious site you don’t know from a malicious site you already know?

A
  • IPs under same domain
  • uses same infrastructure components (DNS records)
  • same domain holders
  • same ASN
  • uses same SSL certs.
26
Q

Why do Exploit Kits normally first attempt to determine the OS and browser version of the visiting browser?

A

Te determine which exploits to serve to the victim in order to have the best chance of triggering a successful infection.

27
Q

Describe what is meant by the term Zero-Day Exploit, and what sort of attacks would these commonly be used in.

A

An exploit for a vulnerability for which there is no current patch / defence.

28
Q

Why has the price of Zero-Day Exploit risen to the point that normal criminals can not generally afford them?

A

Governments are pricing them out of the market to use them for espionage. They are now consider the equivalent of an advanced targeting chip for attacks.