Malware Flashcards

1
Q

Threat Vector

A

specific method used by an attacker to infiltrate a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

how and the way an attacker will infect your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virus

A

malicious software attached to clean files to spread throughout the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

standalone malware programs that replicate and spread to other systems exploiting software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans

A

disguised as legitimate software that allow unauthorized access when executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ransomware

A

encrypts user’s data and holds it hostage until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnet

A

network of zombies and often used in DDOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zombies

A

compromised computers that are remotely controlled by hackers and perform the task of the botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkits

A

tasks that hide their activities and operate at the OS level for ongoing privileged access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor

A

malicious means of bypassing normal authentication processes to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

embedded code placed in legitimate programs that executes a malicious action when a specific condition is met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key loggers

A

records a user’s keystrokes and used to capture passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

secretly monitors and gather information or activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bloatware

A

unnecessary or pre-installed software that consumes system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware Exploitation Techniques

A

involves methods in which malware infiltrates and infects systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Boot-sector Virus

A

stored in the first sector of a hardrive and is loaded into memory whenever the OS boots up

17
Q

Macro Virus

A

a form of code that allows a virus to be embedded in another document and executed when the document is opened

18
Q

Program Virus

A

tries to find executable or application files to infect with their code

19
Q

Multipartite Virus

A

a combination of boot sector viruses and program viruses

20
Q

Encrypted Virus

A

hides itself from detection by leaving the malicious code/payload encrypted

21
Q

Polymorphic Virus

A

the encrypted virus but changes the code scheme every time its executed

22
Q

Metamorphic Virus

A

able to rewrite itself entirely before it attempts to infect a file

23
Q

Stealth Virus

A

the technique itself of preventing virus from detection

24
Q

Armored Virus

A

layer of protection to confuse a person/program from analyzing it

25
Worm vs Virus
A virus requires a user to take action, a worm can replicate itself
26
Remote Access Trojan (RAT)
provides the attacker with remote control of the victim’s machine
27
Rootkit DLL Injection
used to run malicious code within the address space of another process by forcing it to load this DLL
28
Rootkit Shim
software code that is place between two components; Helps DLL injection work
29
File-less Malware
used to create a process in the system memory without relying on the local file in a system
30
Dropper
initiates or runs other malware forms within the payload
31
Downloader
retrieves additional tools post the initial infection form the dropper
32
Shellcode
lightweight code meant to execute an exploit
33
“Actions on Objectives” Phase
execution of their primary objective will commence
34
Concealment
prolong unauthorized access by hiding their tracks
35
“Living of the land”
exploiting standard system tools to perform intrusions