Malware, Hacker Exploits, and Encryption Flashcards

1
Q

What is Malware (Malicious Code)?

A

software or code deliberately written and released for the purpose of causing unwanted actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can malware do?

A

Can be destructive, create back doors on a network, locate and steal sensitive info, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two most common ways to get Malware?

A

Email Attachments

Web Links in emails, instant message, facebook, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a Virus do?

A

Replicates by attaching to a program of file, spread by humans
Spreads from Computer to Computer through user action (downloading, copying, running file)
Passed through emails, disks, peer to peer, visiting infected websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a Worm do?

A

Replicates and contains a payload like a virus

Can spread over a network without any user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between a worm and virus?

A

Difference is a worm is self reliant and does not need to attach itself to a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Trojan Horse?

A

Malicious software that is disguised as legitimate (tricks users into opening or running it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

non-technical, human deception to further goals or aims to get access to a system that they aren’t authorized to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a “Key Logger”?

A

devices that capture every key typed by the victim including space, back space, return, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are Key Stroke Loggers hardware or software?

A

They can be both, but usually they are software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where are key stroke loggers most common?

A

public computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are “Script Kiddies”?

A

Derogatory slang word that refers to beginner hackers who go to websites and copy the code instead of creating it themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Zero Day Exploits?

A

Initial periods of time from where the hacker tool or exploit is released, until the security team comes up with a counter measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “Google Hacking”?

A

Using google or any other search engine to further your hacking activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Port Scanning?

A

Scanning your targets ports to see which ones are open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Port Sweeping?

A

Interested in one port, usually for a specific target and see if that port is open and if target is using that port

17
Q

Info Gathering:

What is Operation System and Resource Discovery?

A

Find out what hardware and software your target is using so the hacker can find exploits in these items

18
Q

Info Gathering:

What is “Escalation of Privilege” in the steps of Attack Methodology?

A

Looking for higher levels of power accounts that allow you access to more things or access more information

ultimately an attacker will want “Administrator” or “Root” access

19
Q

Info Gathering:

What is “Housekeeping” in the steps of Attack Methodology?

A

Attempting to erase signs that they were ever in the system (Using root kits, log deletion or alteration)

20
Q

Password Cracking:

What is a Dictionary Attack?

A

tries every word in a predetermined dictionary

21
Q

Password Cracking:

What is Brute Force Attack?

A

tries every combination of letter, #’s, and characters on the keyboard (a, aa, aaa, ab, aab, etc)

22
Q

Password Cracking:

What is a Popular Password Attack?

A

choosing a Geographical area and picking a word that you think a lot of people would use as a password and run it (ex. DC area using “Redskins” as a password)

23
Q

What are “Exploits”?

A

Tools or techniques that take advantage of flaws (vulnerabilities) in software or hardware, or poor network design/security

24
Q

What are “Input Validation Attacks”?

A

Class of hacking tool/technique where a user enters data into software/environment/website to see what might happen

occurs when software or system is not properly checking input from the outside world

Most common is SQL

25
Q

What is a “Structured Query Language (SQL) Injection Attack”?

A

normally run against servers or ecommerce sites

Injecting or using the hackers own SQL language on the website to see if it will access information in that websites database

Hackers put this language into any of the open field (username, password, search, etc)

26
Q

What can SQL Injection Attacks do to a system?

A

Allow an attacker to completely compromise the database system

Create, read, update, and/or delete any arbitrary data available to the application

Obtain customer records/info; e-shoplift, change account setting and balances

27
Q

What is SQL language?

A

a language that speaks to and interacts with databases

28
Q

definition of input validation attack:

A

hacker tries to run commands of their own against a software or system to see what happens

29
Q

What are Denial of Service Attacks?

A

an attack that denies the service of the computer system or network to its users

Not usually for financial gain

(ex. Overloading Amazon.com)

30
Q

What are Zombie Networks or Botnets?

A

An army of computers that are hacked or infected with Denial of Service related malware that are under the control of the attacker

Infected computers are commanded to flood the victim network either using an IP address or domain name

31
Q

What is a “Syn Flood”?

A

Computes flood the website with data packet info requests but never do the final step of the acknowledgement that websites would send before sending the packets

32
Q

What is Phishing? Spear Phishing?

A

Use of spoofed emails and fraudulent websites designed to fool recipients into divulging personal financial information/data (ie. a link that brings the user to a fake website

spear phishing - selectively targeting people you think/know are associated with that financial institution (Phishing with Social Engineering)

33
Q

What is Pharming?

A

the act of forcing the victim to visit an attackers website when the victim is trying to access a legitimate site

attacker infects victim with malware that tells the DNS to go to the fake site not the legit site

34
Q

What is a DNS Re-Direction Attack?

A

Redirecting the DNS server that the computer looks to when going to a website, making them go to the DNS server that you set up

This involves the use of an “Evil DNS Server”

35
Q

What investigative issues can you run into with these attacks?

A

Hacked website is in a foreign country
Hacked site is not logging IP addresses
IP leads to Proxy Server or Anonymizer
Subject is using a hacked or free WiFi connection