Day 3 Flashcards

1
Q

What is a trojan

A

Something disguised as a legitimate program

Two programs in one

  • -Malware
  • -Legitimate software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Covert Comm channel use what to communicate

A

IRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are Trojans normally used to add the victim to a Botnet

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fast Flux DNS

A

1`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy server Trojans

A

Allows an attacker to use your system as a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTP Trojan

A

Allows user to save files to your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VNC Trojan

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP Trojans

A

Bypass Firewall
Spawn Child programs
Access the INternet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP RAT

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP Tunneling

A

fd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAT

A

Remote Admin Tool

Uses port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Covert Channel Trojan (CCTT)

A

Creates arbitrary transfer channel

Enables attackers to get an external server shell from witin the internal network and vice versa

Sets TCP/UDO/HTTP Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

E-banking Trojans

A

Intercepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malvertisment

A

Uses HTML to create advertisement that runs a script to install a Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TAN Grabber

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTML Injection

17
Q

Form Grabbing

18
Q

Destructive Trojan

19
Q

Notification Trojan

20
Q

Data Hiding Trojans

21
Q

Viruses are self replicating

22
Q

Do viruses attach themselves to other programs

23
Q

Do viruses need human interaction

24
Q

How are viruses transmitted

A

downloads
infected media

email attachements

25
Q

Virus Characteristics

A
Infects other programs
Corrupt files
Alters data 
Transforms itself
Encrypts itself
Self Replicating
26
Q

Virus cycle

A
Design 
Replicate
Launch
Detection
Incorporation
Elimination
27
Q

Infection Phase of a virus

A

Adds itself to the .exe file

28
Q

Attack phase of a virus

29
Q

When a file system runs out of space what does it do

A

Creates a pointer to a new space

Leads to fragmentation

Increases latency

30
Q

Why do people create viruses

A

Inflict damage

Financial benefits

Research projects

Play prank

Vandalism

Cyber terrorism

Distribute political messages

31
Q

Indications of Virus attack

32
Q

Can you get a virus by not running the latest version of the AV software

33
Q

Ransomware

A

Restricts access to the computer files and folders and demands online ransom payments

Cheaper to pay the ransom instead of mitigating the malware

34
Q

What are the primary two types of viruses

A

What do they infect

How do they infect

35
Q

Name some What Do They Infect viruses

36
Q

Name some How Do They Infect viruses

37
Q

File and Multipartite Viruses