CIT Flashcards
ClamAV
Free open-source cross-platform antivirus software
Mainly CLI tool
False Positive (F/P) Causes
Heuristics: AVs evolve and so do viruses
Behavioral Analysis: Legit apps behaving like malicious apps
Machine Learning: Mistakes in training data fed to software
Zero Day
Undiscovered or newly discovered flaw in a program before the vendor can patch it
What are three ways that anti-virus programs discover viruses
String/Byte Signatures
Hash Signatures
Heuristic Detection
Antivirus Bypass Techniques
Packing and Encryption
Fileless Attacks
Code Mutation
Disable AV updates
Stealth Techniques
Internal Firewall
Blocks incoming/outgoing connections to/from the workstation
HIDS/HIPS
Host Based Intrusion Detection System
Host Based Intrusion Prevention System
Detects, protects, and alerts upon malicious activity
Sandbox
Restricted environment used to run suspicious programs and files
EDR
Endpoint Threat Detection and Response
Focuses on detecting and responding to malicious activity on the host
YARA Signature Types
Body-Based Signature: looks for specific sequences
Hash-Based Signature: Looks for identical hashes
YARA Rules
Way of describing a pattern to identify files
Rules written to meet specific conditions
YARA Rule Signature: Max 64 strings
Honeypot
Decoy devices meant to lure attackers
Honeypot Aims
Analysis: analyze attacker’s movements and gain insight
Collection: Collect forensic data needed to improve security
Honeytokens
Fake IT resources designed to draw the attacker’s attention.
Typically found in public areas
Canary Traps
Used to identify internal data leakers. Changes documents slightly and that is traced.
MHN
Modern Honey Network
Open-source platform for honeypot management
Collects and analyzed honeypot data