Chapter 3 Malicious Code Flashcards

1
Q

What is the difference between a worm and a Virus?

A

Viruses require help from the host, worms act independently.

Worms do not rely on the user to trigger them whereas viruses lie dormant until you execute them. Because of this, worms are more dangerous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are ransomware IoCs?

A

Indicators of Compromise include ransom notes, ransomware file extensions, changes to file names or locations, unauthorized or undetected extraction of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Ransomware?

A

Malware that takes over your computer then demands a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Best defense against ransomware?

A

effective backup system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Crypto Ransomware?

A

malware that encrypts files and then holds them hostage until ransom is paid.

Defense - remote backup system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan?

A

Type of malware disguised as a legitimate program.

Classic use of a trojan is with rootkits, which are then used to create a backdoor. Trojans are non-replicating, but can self repair.
Spam emails are the most common cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAT (Remote Access Trojan)

A

A trojan that provides attackers with remote access to systems.

Remote access typically refers to a backdoor. RAT is usually a trojan with a backdoor as its payload.
Remote… Access… Trojan… because how the fuck else are you supposed to access a trojan?

*Beware of spam emails, trojans REQUIRE user interaction to launch!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

malware that spread themselves, they self-install and spread through any means possible.

update regularly, stick to approved apps, use ad-blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

Malware specifically designed to allow attackers system access through a backdoor.

The best way to detect a rootkit is to test the suspected system from a trusted system. Rootkits have typical behaviors and signatures.

Search chkrootkit and rkhunter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor

A

methods or tools that bypass authentication and system security to allow attackers in through a concealed access method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor

A

methods or tools that bypass authentication and system security to allow attackers in through a concealed access method.

Check for unexpected open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bots

A

Bots are remotely controlled systems or devices that have a malware infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

A group of bots that have a command and control center using client-server mode. Modern bots use HTTPS to hide traffic/activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fast Flux DNS Botnet

A

Botnet that uses many IP addresses to answer queries for one or more DNS names. The “fast flux” component refers to the systems in the network of the control (bots) registering and de-registering of addresses every so often.

Can be defeated by forcing DNS requests to organizationally controlled DNS servers rather than allowing outbound DNS requests.

Taking down the domain name is the best way to defeat fast flux DNS based botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger

A

Programs that capture keyboard input, as well as mouse movement touch screens or peripherals.

Use best security practices and MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Logic Bombs

A

Function or code inside a program that activates when set conditions are met. NOT independent malicious programs.

16
Q

Virus

A

malicious programs that self-copy and self-replicate, viruses typically have a trigger and a payload.

Fileless viruses reside on memory, traditional viruses reside on disk.

17
Q

Spyware

A

Malware that spies on users providing information to advertisers.

Defended by using antimalware tools

18
Q

PUP

A

Potentially Unwanted Programs are unwanted programs or software but are not necessarily malicious, they might just be a nuisance.

Use security best practices

19
Q

Malicious Code

A

Malicious scripts and custom built code leverage built in tools like Windows Powershell and VBA or Bash and Python on Linux, or Macros like those build into MS Office.

20
Q

What is the built-in Windows Scripting Language?

A

Powershell

21
Q

What is Visual Basic (VBA)?

A

Visual Basic programming language for Windows

22
Q

Malicious code might use Powershell or VBA in Windows, what might a malicious code be run in on a Linux based machine?

A

Bash, Perl, Python, etc.

23
Q

What is Macros

A

MS Office specific command automation, can be used for running malicious scripts. Macros are disabled by default.
Macros can be run in VBA.

24
Q

How can you defend against malicious code written in Powershell?

A

Use Constrained Language Mode and turn on Logging

25
Q

Are Python, Perl, and Bash interpreted or compiled?

A

Interpreted scripting languages

26
Q

How can one defend against Malicious code written in Bash on a Linux machine?

A

Used Restricted Shell.