Malware Infections Flashcards
What’s a Threat Vector?
The method used by an attacker to gain access to a machine e.g unpatched software, installation through usb stick, phishing
What’s an Attack Vector?
How exactly an attacker can infiltrate your security and how they get malware in.
What’s a watering hole?
Somewhere a user frequently/routinely returns to. e.g Facebook or an invoice website that an attacker can exploit to get malware into your system.
What’s typo squatting?
When an attacker uses your google search typo to get malware into your computer or steal information. e.g. yahooo.com
What’s a Botnet?
Is a collection of compromised computers (zombies) under the control of a master node(C2).
What does DDoS stand for ?
And mean?
Distributed Denial of Service attack.
Occurs when many machines target a single victim and all attack at one time.
What’s active interception ?
Occurs when a computer is placed between the sender and receiver and is able to capture or modify traffic between them. E.g me setting up a fake wifi in a Internet cafe to steal data or insert malware secretly to those who connect to my wifi.
What is Privilege Escalation?
Exploiting a design flaw in a system to gain access to resources that a normal user cannot and progressively increasing the level of credentials until reaching administrative or Kernel level.
What’s a back door?
A way for programmers to bypass all authentication checks for easier and quicker access. [Bad practice]
What’s a Logic Bomb?
It’s malicious software that only activates when certain conditions are met.
Preventing Spam.
What do you not want your email servers configured to?
3 other things can you do to prevent spam?
Verify email isn’t configured as open mail relays or SMTP open relays.
- remove emails from work website (bots collect them)
- use whitelists and blacklists
- train users
info 3 musts
Update anti malware software automatically
Scan computer weekly
Download all patch’s for operating system and applications
Educate and train users( they’re biggest vulnerability)
What is a Dropper?
Malware designed to install or run other types of malware embedded in a payload on an infected host
What’s a downloader?
Piece of code that connects to the internet to retrieve additional tools after the initial infection via a dropper
What’s shellcode?
Any lightweight code designed to run an exploitation on the target, (any language)