7. Malware, Botnets, and Spam Flashcards

1
Q

Name 3 network security problems

A
  1. Host compromise (attacker gains control of host)
  2. Denial-of-service (attacker prevents legitimate users from gaining service)
  3. Both (host compromise that provides resources for DDoS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 5 malware types

A
  1. Virus (program that attaches itself to other program)
  2. Worm (replicates itself over network, usually relying on remote exploit)
  3. Rootkit (program that infects operating system, used for privilege elevation)
  4. Trojan horse (program that opens backdoors on an infected host, gives attacker remote access to machines)
  5. Botnet (group of trojaned machines, used for spam, DDoS, click-fraud, etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 things an attacker can accomplish upon Host Compromise?

A
  1. Read data
  2. Erase data
  3. Compromise other host
  4. Launch DDoS attack on another host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is network code vulnerable?

A

Because it accepts input from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worm spreading slows down towards the end. Why?

A

True, high chance that machines will re-infect already infected machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain 2 ways to speed up worm spread

A
  1. Reduce redundant scanning (each worm instance starts at random point, worm that encounters another instance re-randomizes)
  2. Reduce slow startup phase (construct ‘hit-list’ of vulnerable servers in advance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 classes of monitors in threat detection

A
  1. Network based
  2. Host/endpoint-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static vs Dynamic analysis

A

Static:
- complete analysis
- difficult to extract semantics
- obfuscation/packing

Dynamic:
- easy to see ‘behaviours’
- malware unpacks itself
- dormant code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the ultimate goal of most Internet worms?

A

Compromise machine, install rootkit, then trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a vulnerability of old-school C&C IRC Channels?

A

Single point of failure makes them easy to locate and take down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Fast-flux

A

Generic concept that 1 domain name can be resolves to many IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain a way Botmaster can protect himself?

A

Tell DNS resolver to keep changing IP addresses (fast-flux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Solution to counter traditional fast-flux

A

Black-list the rendez-vous point (domain name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What counters blacklisting a rendez-vous point used by Botmaster?

A

Random domain generation combined with fast-flux. Because domain name changes quickly, hard to get it flagged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you make money off financial credentials?

A

Using money mules. Deposit $ into mule account. They purchase real expensive items. Sell them online. Withdraw cash from ATM using victim credentials. Wire money to source criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 4 possible botnet countermeasures

A
  1. Infection prevention
  2. Infection detection
  3. C&C take downs
  4. Undermine economics (banking take-down)