Chapter 1 - Trojans and Backdoors Flashcards

1
Q

backdoor

A

The entrance to a network that bypasses normal authentication and security procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

client-server network model

A

The model that defines communication interactions between individual client computers and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

covert channel

A

Illegal, hidden path used to transfer data from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Control Message Protocol (ICMP)

A

A connectionless protocol that is generally used to provide error messages to unicast addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICMP tunneling

A

Utilization of the ICMP to bypass filtering by network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Relay Chat (IRC)

A

A form of instant text-based communication carried out over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

keylogger

A

Hardware or software that records the keystrokes or mouse movements entered into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

overt channel

A

Legal, secure channels for transferrign information and data within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Post Office Protocol version 3 (POP3)

A

An e-mail transfer protocol for downloading e-mail from a POP server, using port 110.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transmission Control Protocol (TCP)

A

A protocol that defines and regulates the method of data transmission between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan horse

A

A program in which malicious or harmful code is contained inside apparently harmless programming or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User Datagram Protocol (UDP)

A

A data-transmission protocol that does not require transmission paths to be established before data is transmitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

virtual network computing (VNC) software

A

Software that allows users to remotely control a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

wrapper

A

A program used to bind trojan executables to legitimate files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the signs of a Trojan infection?

A

Various unexplained activity and ports listening that shouldn’t be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name and describe three types of Trojans.

A

RAT - Allow full control over system. Data-Sending Trojan - Provides attackers with passwords and confidential information. Proxy Trojans - Turn the infected system into a proxy server for attacker anonymity.

17
Q

What is a Trojan horse construction kit?

A

Kits help attackers construct Trojan horses of their choice.

18
Q

How do RATs work?

A

They turn the system into a server that listens on specific ports. Not as effective if the system is behind a firewall.

19
Q

Name 3 methods used to detect Trojans.

A
  1. Scan for suspicious open ports. 2 Scan for suspicious running processes. 3. Scan for suspicious registry entries. 4. Scan for suspicious network activities. 5. Run a Trojan detector.
20
Q

How does a reverse connecting Trojan work?

A

The Trojan initiates a connection back to a listening system, allowing the attacker to bypass firewalls.

21
Q

What is an XSS tunnel?

A

A tunnel allowing HTTP traffic through an XSS channel to use any application that supports HTTP proxies.

22
Q

How is a virus different from a worm?

A

Worms are self-replicating, does not modify stored programs, and is easy to remove while viruses are the opposite.

23
Q

What are the three best methods of virus detection?

A

Scanning, Integrity checking and interception.

24
Q

What do macro viruses target?

A

Single applications

25
Q

What phases are part of a virus’s cycle?

A

Infection and Attack