Chapter 8: Malicious Code and Application Attacks Flashcards

1
Q

What is a “script kiddie”?

A

A malicious individual who doesn’t understand the technology behind security vulnerabilities but downlaods ready-to-use software from the Internet and uses them to launch attacks against remote systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the Zeus trojan horse.

A

Zeus is widely believed to be the product of an Eastern European organized crime ring seeking to infect as many systems as possible to log keystrokes and harvest online banking passwords. The Zeus outbreak started in 2007 and continues today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer virus?

A

A virus is malicious code that spreads from system to system aided by unsuspecting computer users seeking to share data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the MBR?

A

MBR is the Master Boot Record, which is the bootable portion of a hard disk that contains information used to load the operating system during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a MBR virus?

A

A virus which attacks the master boot record. Since the MBR is very small, these viruses generally store most of their code elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a file infector virus?

A

A virus which infects executable files, such as .exe and .com files. They typically slightly alter the targeted file, but may entirely replace it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a companion virus?

A

A virus that doesn’t change the original binary, but uses a similar but different filename. For example, game.com instead of game.exe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a macro virus?

A

A virus executed in an application’s scripting language. Melissa in Word, 1999. I Love You, 2000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a service injection virus?

A

A virus which injects itself into trusted runtime processes like svchost.exe, winlogin.exe, or explorer.exe. This helps these viruses escape detection by antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best technique to defend against service injection?

A

Keeping all software that can view web content up to date. (browsers, media players, helper applications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the zero day problem?

A

Antivirus is an arms race, with AV always trying to keep up with evolving threats. Day 0 exploits don’t have patches or detection mechanisms simply because they’re new.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do most antivirus packages work?

A

Most use signature detection. This is essentially a large database that contains the telltale characteristics of all known viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a multipartite virus?

A

A virus that uses more than one propagation technique to attempt to penetrate systems that only defend against one or a few techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a stealth virus?

A

A virus that hide by tampering with the OS to fool antivirus packages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a polymorphic virus?

A

A virus that actually modifies it’s own code as it travels from system to system. The propagation and destruction techniques remain unchanged, but this signature changes to make detection more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an encrypted virus?

A

A virus that uses cryptographic techniques to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a logic bomb?

A

A malicious code object that infects a system and lies dormant until it is triggered by the occurrence of one or more events.

18
Q

What is a trojan horse?

A

A program that appears benefolent but carries a malicious, hidden payload.

19
Q

What is a worm?

A

A malicious code object that can propagate without human interaction.

20
Q

What did the Code Red worm do?

A

Randomly selected hundreds of IPs to attack, probed them for vulnerable versions of IIS, defaced the web serer with “Welcome to http:///www.worm.com! Hacked by Chinese!”, and planted a logic bomb that would DoS an IP that belonged to whitehouse.gov.

21
Q

What was Robert Morris’s punishment for the famous Morris worm?

A

3 years probation, 400 hours community service, $10,000 fine under the DFAA of 1986.

22
Q

What was Robert Morris’s dad’s job?

A

He was director of the National Security Agency’s Computer SEcurity Center.

23
Q

What is Stuxnet?

A

A highly sophisticated worm that was discovered in 2010. It searched for unprotected administrative shares on the local network, exploited zero day vulnerabilities in Windows Server and Print Spooler services, connected to systems using a default database password, or spread by infected USB drive.

Stuxnet spread widely, but was looking for systems using a controller manufactured by Siemens and allegedly used in the production of material for nuclear weapons. When it found such a system, it deployed a payload intended to destroy centrifuges attached to the controller.

24
Q

What is spyware?

A

Malicious code that monitors your actions and transmits important details to a remote system that spies on your activity.

25
Q

What is adware?

A

Malicous code that uses a variety of techniques to display ads on infected computers.

26
Q

What’s the best malicious code countermeasure for client systems?

A

Updated antivirus software that searches local storage for viruses.

27
Q

What are the solutions to signature-based antivirus problems?

A

Integrity checking software like tripwrie and access controls that limit the ability of malicious code to damage data.

28
Q

What other techniques can prevent systems from being infected by malicous code?

A

Sandboxing, like Java.
ActiveX control signing to insure code comes from a trusted source
Whitelisting applications at the operating system level, which requires administrators specifically approving applications.

29
Q

List password attacks

A

Password guessing
Dictionary attacks
Social engineering

30
Q

What is the cornerstone of any security program?

A

Education

31
Q

List the application attacks

A

Buffer overflow
time-of-check to time-of-use
back doors
escalation of privileges and rootkits

32
Q

What is a buffer overflow

A

It’s an input validation error where an external input is allowed to be longer than the internal space allocated for it

33
Q

Describe the time-of-check to time-of-use attack

A

It’s a timing vulnerability where access permissions are checked too far in advance of a resource request.

34
Q

What is a back door?

A

An undocumented command sequence that allows an individual with knowledge of it to bypass normal security restrictions

35
Q

What is escalation of privilege?

A

.

36
Q

What is a rootkit?

A

.

37
Q

How does cross-site-scripting (XSS) work?

A

.

38
Q

How does SQL injection work?

A

.

39
Q

How do you defend against SQL injection?

A

input validation, limit account privs, use stored procedures

40
Q

List the reconnaissance attacks

A

IP probes
port scans
vulnerability scans
dumpster diving

41
Q

List the masquerading attacks

A

IP spoofing

Session hijacking

42
Q

What is a masquerading attack?

A

.