Malware Flashcards
Threat Vector
Method used by an attacker to access a victim’s machine
Attack Vector
Method used by an attacker to gain access to a victim’s machine in order to infect it with malware
Botnet
A collection of compromised computers under the control of a master node
Active Interception
Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them
Privilege Escalation
Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access
Backdoors
Backdoors are used to bypass normal security and authentication functions
Remote Access Trojan
Remote Access Trojan (RAT) is placed by an attacker to maintain persistent access
Logic Bomb
Malicious code that has been inserted inside a program and will execute only when certain conditions have been met
Easter Egg
Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature
Dropper
Malware designed to install or run other types of malware embedded in a payload on an infected host
Downloader
Exploit Technique
A piece of code that connects to the Internet to retrieve additional tools after the initial infection by a dropper
Shellcode
Any lightweight code designed to run an exploit on the target, which may include any type of code format from scripting languages to binary code
Code Injection
Exploit technique that runs malicious code with the identification number of a legitimate process § Masquerading § DLL injection § DLL sideloading § Process hollowing
Living Off the Land
Exploit techniques that use standard system tools and packages to perform intrusions