Lecture 21: Malware and attacks Flashcards

1
Q

What are some examples of what can occur in malware and cyber attacks?

A

export, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the goals of malware and cyber attacks?

A

1) disabling the target computer or knocking it offline

2) getting access to the target computer’s data and perhaps gaining admin privileges on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the attack methods for malware and cyber attacks?

A
social engineering
hacking and cracking
viruses and worms
trojan horses
denial of service (DoS) attacks
rootkits
blended treats
zero-day attacks
bots and botnets
buffer overflow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is social engineering?

A

persuading someone to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is hacking and cracking?

A

guessing, corrupting or stealing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a viruses i.t.o malware?

A

propagates by inserting a copy of itself into and becoming part of another programme e.g. Melissa, CryptoMix

executable piece of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm i.t.o malware?

A

replicates functional copies of itself but does not require a host program’s help to propagate e.g. WannaCry, Code-Red, Nimda, Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan horse?

A

harmful piece of software that looks legitimate –> backdoor trojan, downloader trojan, ransom trojan

normally waiting to be downloaded or installed by a user and then executing attack e.g. email attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are network layer attacks?

A

IP spoofing (masquerading), sequencing number prediction, TCP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are web-based attacks?

A

cross-site scripting, cooking poisoning, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of DoS operating system attacks?

A

Ping of Death, Tear Drop, Land, Snork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of DoS network attacks?

A

SYN flood, TCP fin/rst, Smurf, Coke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of DoS distributed Dos attacks?

A

Cayosin, TCP Flood, Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is are some examples of social engineering attacks?

A

1) phishing attacks on bank customers
2) inviting someone to log into a bogus website –> spoofed bank website
3) impersonating a new employee who has forgotten user ID and/or password
4) impersonating a technician support staff member and requesting a user to “check” accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do social engineering attacks commonly persuade someone to do?

A

run/install malicious or subverted software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline what a spear phishing attack involves

A

1) email appearing to be from an individual or business that users know
2) looking for credit card and bank account numbers, passwords, and other financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of attack is a spear phishing attack?

A

social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Outline hacking and cracking

A

password discovery by trying default passwords e.g. “guest”

password cracking tools, readily available from the internet for a wide range of password protection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the password attacks?

A

1) brute force attacks

2) dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a brute force password attack?

A

try every combo for a password with few characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a dictionary attack?

A

for real-word passwords, use database of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What tools can be used for doing password attacks?

A

CRACK, L0phtcrack, John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are one-time passwords (OTPs)? Why is it valuable?

A

an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session.

An OTP is more secure than a static password, especially a user-created password, which can be weak and/or reused across multiple accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do viruses travel and spread?

A

attaching itself to legitimate executable programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What do viruses cause?
some unexpected and usually undesirable behaviour
26
Give an example of how viruses can automatically spread to other computer users?
tranfering infected files via email attachments
27
Do worms run independently ?
yes
28
How can a worm propagate a complete working version of itself onto other host on a network?
usually by exploiting software vulnerabilities in the target system
29
Do trojan horses use infected files or propagation?
no
30
What does installing a trojan horse allow the attacker to access?
user's machine remotely via the internet
31
What are the components of a trojan horse?
1) client application run on the attacker's computer | 2) server application run on the victim's computer
32
Once a trojan horse is install/downloaded by the victim, what is the next step in the attack?
Computers on network are scanned to locate any with a trojan installed, creating a botnet
33
What is botnet short for?
Robot network
34
Outline the Zeus trojan horse attack
Stealing banking information by keystroke logging Spreading through drive-by downloads and phishing schemes Compromising thousands of accounts on websites of companies largest botnet on the Internet --> million of compromised computers (3.6 million in USA)
35
What is the intention of a DoS attack?
Making network services unavailable to users | rather than gaining illegal access
36
How does a DoS attack make the network unavailable?
Flooding attacks overload servers
37
What are some examples of DoS attacks?
Ping o’ Death, SYN flood, ICMP redirect | messages
38
What does a DoS attacker threaten the victim with?
Financial incentive and extorsion
39
Is there a solution to prevent DoS attacks?
No magic solution 1) Sharing services across different servers 2) Using a properly configured firewall
40
Explain the process of a normal TCP connection setup
TCP SYN-ACK sequence: client: "may I have a connection?" server: "I'll set aside one just for you" client: "great, I'll take it"
41
Explain the process of an abnormal TCP connection setup
TCP SYN-ACK sequence: client: "may I have a connection?" server: "I'll set aside one just for you" server: "do you still want this connection?"
42
Explain the process of an organised DoS attack
TCP SYN-ACK sequence: client: "may I have a connection?" server: "I'll set aside one just for you" server: "do you still want this connection?" REPEATED to all clients Over time, other requests will not be serviced (too busy with pending requests) System locks up, does not really die (just impaired)
43
What are rootkits?
Collection of programs that hackers use to mask intrusion | and obtain admin access
44
What must an intruder obtain before installing a rootkit?
after obtaining user-level | access
45
How can an intruder obtainer user-level access in order to install a rootkit?
By exploiting known vulnerability or cracking password
46
What is the goal of a rootkit attack?
Collecting user IDs and passwords to other machines on | the network --> Thus giving the hacker root/privilege access
47
What are the utilitises of rootkits?
1) Monitoring traffic and keystrokes 2) Creating a “backdoor” into the system for hacker’s use 3) Altering log files 4) Attacking other machines on the network 5) Altering existing system tools to circumvent detection
48
Comment on the availability of rootkits on operating systems
Available for a number of operating systems.
49
Comment on rootkits' detectivity
Increasingly difficult to detect on any network
50
What is a blended threats attack?
Software exploit that involves a combination of attacks against different vulnerabilities
51
What vulnerabilities can blended threats attack involve?
1) Worms dropping parasitic viruses 2) Destructive trojan horses 3) Password stealers 4) Remote access trojans (RATs) 5) Trojanised applications replacing legitimate system tools 6) Multiplatform attacks - -> I Payloads affecting multiple platforms - -> I Linux worms with drop.exe trojans 7) Advanced persistent threats (APTs)
52
What is a RAT?
remote access trojans Malware threat
53
What were RATs previously used in? Where are they used now?
attacks against energy sectors Now aimed at organizations using/developing industrial applications and machines
54
What is Havex?
Distributed new version of a RAT
55
Briefly outline Havex
Discovered in 2013 by F-Secure Hacking into websites of industrial control system (ICS) manufacturers and poisoning their software downloads
56
What does APT stand for?
Advanced persistent threats
57
What are APTs?
Set of stealthy and continuous computer hacking processes. Involving humans in real-time Sophisticated techniques using malware to exploit vulnerabilities in systems External command and control, continuously monitoring and extracting data off a specific target
58
What do APTs target? Why?
organizations for business motives and nations | for political motives
59
What do APTs require?
a high degree of covertness over a long period | of time
60
What are examples of APTs?
Stuxnet, Duqu, Sandworm, BlackEnergy
61
Outline what zero-day attacks take advantage of
1) software vulnerabilities for which there is no available fix 2) flaws before software makers can fix them
62
What do zero-day attacks emphasise?
e importance of safe configuration policies | and good incident reporting systems
63
Explain the blaster worm zero-day attack
One of the most virulent ever Hitting the Internet barely one month after Microsoft released a patch for the flaw it exploited
64
Explain the nachi worm zero-day attack
A variant of Blaster worm Carrying a dangerous payload. Hitting users less than a week later
65
Comment on the timelines of zero-day attacks
collapsing --> Only a matter of time before users see attacks against flaws not yet discovered or for which no patches are available
66
Explain the diagram on slide 27 of set 22 about the zero-day attacks getting closer
TODO
67
Give an overview of a bot
Derived from the word “robot” Also called webcrawler Software agent interacting with other network services intended for people as if it were a real person Typical use is gathering information
68
Give an overview of a botnet
Collection of software bots, running autonomously Usually a collection of compromised machines running worms, trojans or backdoors
69
What is the buffer overflow attack used for?
to gain remote execution on host
70
What does the buffer overflow attack take advantage of?
inadequate buffer boundary checking in applications/services
71
What does a buffer attack often involve?
overwriting return addresses on the stack sending executable code as binary data within the attack data stream --> Usually carefully crafted to be located at specific position within a buffer
72
What type of attack is the heartbleed bug?
buffer overflow attack
73
Outline what the heartbleed bug is
Bug in the OpenSSL’s implementation of the SSL/TLS heartbeat extension When exploited, it leads to the leak of memory contents from the server to the client and from the client to the server
74
Comment on the scale of the heartbleed attack
Well-known bug in SSL/TLS
75
What is the heartbleed bug exploited for?
to access memory - -> Secret cryptographic keys - -> User names, passwords, their contents
76
Is the heartbeat bug public knowledge?
yes --> Supposed to exist at least 2 years before discovery