malicious software Flashcards

1
Q

what is a botnet

A

a network of compromised machines acting as a network

  • responsible for things such as large scale network probing
  • launching ddos
  • spam
  • click-fraud campaigns
  • info theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a trojan horse

A

a program appearing as a regular program but hides malicious activity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a webroot

A

a dll based attack; spreads via drive by downloads; sophisticated rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what was the torpig botnet

A

it was a combination of a mebroot and a trojan horse that was distributed bia mebroot via drive by downloads and a sophisticated rootkit.

It injected into 29 software platforms to steal sensitive information, used http injection for phishing, encrypted http as command and control protocol, and used a resilient approach “domain flux”; to contact command and control center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how do you go about in beggining to understand and contain malicious software

A

Principle 1: the hijacked botnet should be operated so that any harm
and/or damage to victims and targets of attacks would be minimized
Always responded with okn message
Never sent new/blank conguration le
Principle 2: the sinkholed botnet should collect enough information to
enable notication and remediation of aected parties
Worked with law enforcement (FBI and DoD Cybercrime units)
Worked with bank security ocers
Worked with ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a sinkholed botnet

A

a bot net that is controlled by “good guys”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

where do most malicipous threats start

A

the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malicious webpage does what to gain arbitraty code execution

A

leverage of a defect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is malicious software

A

(Malware) refers to any unwanted software and executable code that is used
to perform an unauthorized, often harmful, action on a computing device. It
is an umbrella-term for various types of harmful software, including viruses,
worms, Trojans, rootkits, and botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which two malicious software are self spreading

A

virus/worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which five malicious software are non-spreadomg

A

root-kit, trojan horse, dialer, spyware, keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which 3 malicious software require a host

A

virus, root-kit and

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which 4 malicious software do not require a host

A

trojan, dialer, spyware, keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a virus

A

Self-replicating
Needs a host to infect
Boot (Brain virus), overwrite, parasitic, cavity, entry point obfuscation,
code integration (W95/Zmist virus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

whats a worm

A

Self-replicating, spreads (autonomously) over network
Exploits vulnerabilities aecting a large number of hosts
Sends itself via email
e.g., Internet worm, Netsky, Sobig, Code Red, Blaster, Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

whats atrojan

A

Malicious program disguised as a legitimate software

Many dierent malicious actions

17
Q

whats a rootkit

A

Used to keep access to a compromised system
Usually hides les, processes, network connections
User- and kernel-level