Lesson 11.1 - Internet Worms Flashcards

1
Q

What is a Virus?

A

An “Infection” of an existing program that results in the modification of behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Internet Worm?

A

usually spread by exploiting flaws in existing programs or open services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a parasitic virus?

A

Typically infects an existing executable file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a memory-resident virus?

A

Infects running programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a boot sector virus?

A

A virus that spreads whenever the system is booted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a polmorphic virus?

A

A virus that encrypts part of the virus program using a randomly generated key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between Worms and viruses?

A

Viruses: Spread manually
Worms: Spread automatically by scanning for vulnerabilities. A worm can use any of the virus techniques to gain initial access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main difference between a worm and a vius?
A. Worms do not have destructive payloads?
B. Viruses only infect windows machines
C. Viruses can spread more rapidly
D. Worms can spread automatically

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three steps in a worm’s “life-cycle”?

A
  1. Discover/”scan” for vunerable hosts
  2. Infect vulnerable machine via remote exploit
  3. Remain undiscoverable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do we model fast-spreading worms

A
Using the Random Constant Spread model
K: Initial compromise rate
N: Number of vulnerable hosts
a: fraction of hosts already compromised.
Nda: Newly infected in dt
Nda = (Na)*K(1-a)dt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to increase initial compromise rate?

A
  1. Hit List: List of vulnerable hosts (recon)
  2. Permutation scanning: Shared permutation of IP address lists. Start from own IP + work down, ensuring compromised lists don’t duplicate work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What allowed the slammer worm to spread quickly?
A: TCP / reliable transport
B: UDP / connectionless transport
C: Infected many OS types
D: Could fit in a single packet
A

B & D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly