Domain 3: System Vulnerabilities Flashcards
Method that is used to pass info over a path that is not normally used for communication
Covert Channels
Shortcut in a system that allows a user to bypass security checks, such as username/password
Backdoor
Backdoor installed by developers to bypass normal system checks during development such as authentication
Maintenance hooks
- Virus written macro language
- i.e. Microsoft Office
Macro Virus
Virus that infects the boot sector of a PC, which ensures that the virus loads upon system startup
Boot Sector Virus
Virus that changes itself from the OS and other protective software i.e. antivirus software
Stealth Virus
Virus that changes its signature upon infection of a new system, attempting to evade signature based antivirus software
Polymorphic Virus
Virus that spreads via multiple vectors
Multipartite Virus
Malware that self-propagates
Worms
Malware disguised as a legitimate program
Trojans
Malware that replaces portions of the kernel and/or OS
Rootkits
- Neutral technology used to shrink the size of executables
- Often used in malware to evade signature-based malware detection
Packers
- Malware that is triggered when a logical condition is met
- i.e. after a set number of transactions, or on a specific data
Logic bombs
Antivirus that uses static signatures of known malware
Signature-based antivirus
Anomaly-based detection used to identify behavioral characteristics of malware
Heuristic-based antivirus
Attacks launched directly from an attacker (the client) to a listening service
Server-side attacks