Chapter 21 Flashcards

1
Q

Virus

A

2 main functions:
- Propagation
- Payload execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus propagation techniques

A
  1. MBR - master boot record; can compromise and point to infected boot sector
  2. File infector - infected executable files
  3. Companion virus - has same name as real OS executables but diff file extension
  4. Macro viruses - such as VB for apps
  5. Service injection virus - infected OS processes, e.g. svchost.exe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus technologies

A
  1. Multipartite virus - use different propagation methods, e.g. file infector + MBR
  2. Stealth virus - hide by tampering with OS
  3. Polymorphic virus - modifies itself as it propagates so have diff signatures
  4. Encrypted virus - similar to polymorphic; key is different as it propagates so signature is different
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A

Dormant until triggered by event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan horse

A
  • Fake antivirus sw
  • Remote access Trojans (RATs); opens backdoor such as SSH
  • Cryptomalware - steal computing power for crypto mining
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Self propagate without human intervention

Well known examples:
1. Code Red
- Probed hosts with IIS vulnerability
- Defaced local webpage
- Installed logic bomb that initiated DoS on White House website
2. RTM and Internet Worm - exploit vulnerability in UNIX
- Sendmail debug mode
- Password attack
- Finger buffer-overflow vulerability
- Trust relationship to infect other systems
Stuxnet - created by Israel/US to target Iran nuclear facilities and destroy centrifuges attached to Siemens controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware and Adware

A

Potentially Unwanted Programs (PUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

Malware that weaponizes cryptography; encrypt victim’s data and ask for ransom to get key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Window of vulnerability

A

Time between discovery and availability of patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Antimalware software

A
  • Signature based
  • Heuristic mechanism to detect abnormal behavior

Action options:
1. Disinfect
2. Quarantine
3. Delete to preserve system integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Important OS file integrity monitoring

A

Such as changes to command.com
Compare with stored file hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User and Entity Based Analytics (UEBA) systems

A

Analyze based on focus on user activity/behavior
As opposed to EDR which is focused on endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR (endpoint detect and response) systems

A
  • Analyze endpoint memory, file, network activity
  • Automatically isolate malicious activity
  • Integrate with threat intelligence sources
  • Integrate with other incident response systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Attacks

A
  1. Buffer overflow
  2. Time of Check to Time of Use (TOC/TOU) - known as state attacks; race conditions
  3. Backdoors - left over by developers
  4. Privilege escalation and rootkits - to escalate from standard to root level after access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Injection Vulnerabilities

A
  1. SQL injection - content-based blind SQL injection; timing-based blind SQL injection
  2. LDAP injection
  3. XML injection
  4. Command injection
  5. HTML injection
  6. Code injection
  7. File injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authorization Vulnerabilities

A

Exploit outside of authorized access

  1. Insecure direct object reference - e.g. change ID number in the URL to access other files/pages
  2. Directory traversal
  3. File inclusion - takes advantage of “include” attribute in URL; can be local or remote file
16
Q

Cross-site Scripting (XSS)

  • a form of HTML (code) injection
A

Reflected XSS - reflected input; embedded in phishing link
Stored/Persistent XSS - stored on server side, such as XSS link in forum
DOM XSS - client side by using DOM (document object model) of browser

Mitigation:
- input validation
- output encoding; transform char to code

17
Q

Request Forgery

  • execute commands against a remote server/site
A

Cross-site Request Forgery (XSRF or CSRF) - using remote site’s trust on the user to execute commands

Server-side Request Forgery (SSRF) - trick server to visit URL

18
Q

Application security controls

A
  1. Input validation - input whitelisting/blacklisting
  2. Web application firewall (WAF) - work in layer 7
19
Q

DB security

A
  1. Stored procedures, parameterized queries
  2. Data obfuscation and camouflage:
    - Data minimization
    - Tokenization
    - Hashing (encryption)
20
Q

Secure coding practices

A
  • Avoid comments in public viewable code
  • Error handling
  • Avoid hardcoded credentials
  • Do not create backdoor