Day 3 Flashcards
What is a trojan
Something disguised as a legitimate program
Two programs in one
- -Malware
- -Legitimate software
Covert Comm channel use what to communicate
IRC
Are Trojans normally used to add the victim to a Botnet
Yes
Fast Flux DNS
1`
Proxy server Trojans
Allows an attacker to use your system as a proxy
FTP Trojan
Allows user to save files to your system
VNC Trojan
dd
HTTP Trojans
Bypass Firewall
Spawn Child programs
Access the INternet
HTTP RAT
f
ICMP Tunneling
fd
RAT
Remote Admin Tool
Uses port 80
Covert Channel Trojan (CCTT)
Creates arbitrary transfer channel
Enables attackers to get an external server shell from witin the internal network and vice versa
Sets TCP/UDO/HTTP Channel
E-banking Trojans
Intercepts
Malvertisment
Uses HTML to create advertisement that runs a script to install a Trojan
TAN Grabber
d
HTML Injection
F
Form Grabbing
d
Destructive Trojan
f
Notification Trojan
f
Data Hiding Trojans
f
Viruses are self replicating
True
Do viruses attach themselves to other programs
Yes
Do viruses need human interaction
Yes
How are viruses transmitted
downloads
infected media
email attachements
Virus Characteristics
Infects other programs Corrupt files Alters data Transforms itself Encrypts itself Self Replicating
Virus cycle
Design Replicate Launch Detection Incorporation Elimination
Infection Phase of a virus
Adds itself to the .exe file
Attack phase of a virus
f
When a file system runs out of space what does it do
Creates a pointer to a new space
Leads to fragmentation
Increases latency
Why do people create viruses
Inflict damage
Financial benefits
Research projects
Play prank
Vandalism
Cyber terrorism
Distribute political messages
Indications of Virus attack
on slide
Can you get a virus by not running the latest version of the AV software
Yes
Ransomware
Restricts access to the computer files and folders and demands online ransom payments
Cheaper to pay the ransom instead of mitigating the malware
What are the primary two types of viruses
What do they infect
How do they infect
Name some What Do They Infect viruses
f
Name some How Do They Infect viruses
f
File and Multipartite Viruses
1:07:20