Malware Flashcards

1
Q

What are six motivations for writing malware?

A
  1. Fun
  2. To show something is possible
  3. Vandalism
  4. Steal information
  5. Control machines for DDoS or spam
  6. To make money
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a payload?

A

What malware will do when triggered by an action, such as starting up Windows, keylogger starts, timed shutdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s another term for crimeware?

A

Toolkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give three distinguishing features of a virus

A
  1. It reproduces it’s own code.
  2. It attaches itself to other files (a virus cannot survive by itself)
  3. Gets executed when the infected executable file is executed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the structure of a virus and what do each components do?

A
  1. Infection mechanism: how a virus spreads or propagates, enabling it to replicate. Also known as ‘infection vector’
  2. Trigger: event/condition that determines when payload is activated. Also known as ‘logic bomb’
  3. Payload: what the virus does, besides spreading. May involve damage or benign but noticeable activity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During its lifetime, what four phases does a typical virus go through?

A
  1. Dormant: virus is idle and will eventually be activated by some event.
  2. Propagation: virus places a copy of itself into other programs or into certain system areas on the disk.
  3. Triggering: virus activated to perform the function for which it was intended, can be caused by a variety of system events.
  4. Execution: function is performed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s a worm and how does it replicate itself? (Five ways)

A

A work is a program that actively seeks out more machines to infect. Once activated, it may replicate and propagate again. Replicates through:

  1. Electronic mail / instant messaging
  2. Remote execution capability (reverse shell)
  3. Remote file access / transfer capability
  4. Remote login capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give three distinguishing features of a bot

A

Easy to control remotely.

Implementation of different commands.

Infected machines are incorporated in large networks (botnets) that are controlled by the bot master.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one advantage of Host-based Blocking Software over antivirus detection?

And what is one limitation?

A

Advantage: it can block suspicious software in real time.

Limitation: because the malicious code must run on the target machine before all its behaviours can be identified, it can cause harm before it’s been detected and blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Out of a bot, Command and Control server, a botnet and the botmaster, which is the weakest link?

A

The Control and Command server. It’s a single point of failure, therefore real botnets don’t have a single Command and Control server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s a Trojan horse and what are it’s three distinguishing features?

A

Trojan is a class of malware that appears to perform a desirable function but also performs undisclosed malicious activities.

  1. Requires user to explicitly run the program.
  2. Unable to make copies of itself or self-replicate.
  3. Can be used to perform any kind of malicious activity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In general, what are the three lines of defence against DDoS attacks?

A
  1. Attack prevention and pre-emption (before the attack)
  2. Attack detection and filtering (during the attack)
  3. Attack source trace back and identification (during and after the attack)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly