Malicous Code Flashcards

1
Q

In 2010 how many strains of Virus’s did Symantec claim to exist?

A

Over 286

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two primary functions of a virus?

A

Propagation and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a MBR virus do?

A

Infects/ overwrites the master boot record of a disk/ media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between master boot record and master boot sector?

A

MBR - determines what media partition to boot from.

Master boot sector - sector of disk with boot data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the sequence of execution extensions in a windows OS?

A

.com
.exe
.bat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a companion virus?

A

Virus that has an executable name one sequence of execution higher than intended program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a service injection virus?

A

Virus that takes over a trusted OS service ie SVCHOST.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two forms of AV methodology?

A
  1. Signature based

2. Heuristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What actions can a AV platform typically take against a virus?

A
  1. Eradicate and clean.
  2. Quarantine.
  3. Delete
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a multipartite virus?

A

Virus that can infect in multiple methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a stealth virus?

A

Virus that will cover itself from inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a polymorphic virus?

A

Virus that changes itself as it moves form system to system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an encrypted virus?

A

Virus that will encrypt portions of its executable to hide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What was the code red worm?

A

Launched in 2001. Did three things:

  1. Port scan to find IIS platforms and exploited weakness.
  2. Changed webpages with hack message
  3. Turned server into a bot that would attack WH.gov.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spyware?

A

Watches activities of users on system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is adware?

A

Displays ads on infected system.

17
Q

What is active content?

A

Code that is downloaded from server to client for local execution.

18
Q

Tripwire is what class of software?

A

Integrity management.

19
Q

What sort of control mechanisms are in place in Java and ActiveX?

A

Java - Sandbox

ActiveX - Digital signatures

20
Q

What is whitelisting?

A

Practice used by administrators to allow specific applications to be executed.

21
Q

What issues lead to zero day vulnerabilities?

A
  1. Delays in announcement and fix

2. Delays in patching

22
Q

What is an alternative to the Unix /etc/passwd file?

A

/etc/shadow

23
Q

What is a buffer overflow?

A

When input data exceeds the structure that was built to receive it.

24
Q

What steps should a developer take when dealing with input data?

A
  1. Input cannot exceed data length.
  2. Input type cannot be changed int vs char
  3. Answers must be checked for validity.
25
Q

What is TOCTTOU?

A

Time of check to time of use. Validations are constantly checked an immediately effective.

26
Q

What is a back door?

A

Undocumented commands that allow specific users to bypass security controls.

27
Q

What is cross site scripting attack?

A

Attack that embeds rouge command in place and sends back to client.

28
Q

What should you do to avoid SQL Injection attack?

A
  1. Strip things like semi-colon and quotes from input fields.
  2. Use stored procedures.
  3. db IDs should only have read level access.
29
Q

What are some sample firewall rules to protect against IP spoofing?`

A
  1. Packets with internal addresses should never originate from outside.
  2. Packets with external addresses should only originate from outside.
  3. Private IP ranges don’t move in either direction (in or out).
30
Q

What is another example of session hijacking?

A

Man in the middle attack.