M1 Malware Flashcards
What is Malware?
Malware (Malicious Software) refers to any harmful program or file intentionally designed to damage or gain unauthorized access to a computer, network, or server.
Example types include keyloggers, trojans, ransomware, and rootkits.
What are common types of Malware?
- Keyloggers
- Trojans
- Ransomware
- Rootkits
What is a Keylogger?
Records keystrokes to capture sensitive data, such as passwords or bank information.
Forms include software keyloggers and hardware keyloggers.
What is a Trojan?
Malware disguised as a legitimate program to entice users to install it, giving attackers access to the system.
Common types include SMS Trojan, Backdoor Trojan, Ransom Trojan, Downloader Trojan, and Fake AV Trojan.
What is Ransomware?
Encrypts files and demands a ransom for decryption.
Infection methods include email phishing, website pop-ups, and drive-by downloads.
What is a Rootkit?
Malware that provides hidden, persistent access to a system for attackers.
Types include Firmware Rootkits, Bootloader Rootkits, Memory Rootkits, Application Rootkits, and Kernel Mode Rootkits.
What is a Virus?
Malware that replicates by infecting files or programs.
Examples include Creeper, Elk Cloner, and ILOVEYOU.
What is a Worm?
A type of malware that can self-replicate without needing a host program and spreads automatically, often causing network disruptions.
What is Phishing?
Fraudulent emails attempting to steal sensitive data or spread malware.
What is a Man-in-the-Middle (MitM) Attack?
Eavesdropping attacks where attackers intercept data between two parties.
What is a Denial-of-Service (DoS) Attack?
Overwhelms a system with traffic to prevent legitimate access.
What is SQL Injection?
Injects malicious code into SQL databases to access unauthorized data.
What is a Zero-Day Exploit?
Attacks a system vulnerability before it is patched.
What are common Cybersecurity Measures?
Antivirus Software
Firewalls
What are the types of Hackers?
Black Hat, White Hat, Gray Hat, Blue Hat, Red Hat
Stateful Firewalls
Tracks active connections to ensure legitimate traffic.
Example: Stateful firewalls keep track of the state of network connections to allow only authorized traffic.
Application Firewalls
Monitors HTTP traffic and blocks web-based threats.
Application firewalls focus on monitoring and controlling traffic at the application layer to protect against web-based threats.
Black Hat
Illegally access systems for personal gain, often causing harm.
Black Hat hackers are motivated by personal gain and typically engage in illegal activities to compromise systems.
White Hat
Ethical hackers who secure systems by identifying vulnerabilities.
White Hat hackers work to improve security by identifying weaknesses in systems and helping to fix them.
Gray Hat
Hackers who explore systems without harmful intent but without authorization.
Gray Hat hackers may test systems without permission, but their actions are not malicious in nature.
Blue Hat
Motivated by revenge, targeting specific individuals or organizations.
Blue Hat hackers seek revenge by targeting specific individuals or organizations through cyber attacks.
Red Hat
Vigilantes targeting Black Hat hackers to prevent future attacks.
Red Hat hackers take a proactive approach by targeting Black Hat hackers to prevent future malicious activities.
Green Hat
New hackers seeking to learn and develop hacking skills.
Green Hat hackers are beginners who are eager to learn and improve their hacking abilities.
Script Kiddies
Inexperienced individuals using pre-made software to disrupt systems (e.g., DoS attacks).
Script Kiddies rely on ready-made tools to launch attacks without understanding the underlying technology.