Malware Infections Flashcards

1
Q

What’s a Threat Vector?

A

The method used by an attacker to gain access to a machine e.g unpatched software, installation through usb stick, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s an Attack Vector?

A

How exactly an attacker can infiltrate your security and how they get malware in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s a watering hole?

A

Somewhere a user frequently/routinely returns to. e.g Facebook or an invoice website that an attacker can exploit to get malware into your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s typo squatting?

A

When an attacker uses your google search typo to get malware into your computer or steal information. e.g. yahooo.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a Botnet?

A

Is a collection of compromised computers (zombies) under the control of a master node(C2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DDoS stand for ?

And mean?

A

Distributed Denial of Service attack.

Occurs when many machines target a single victim and all attack at one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s active interception ?

A

Occurs when a computer is placed between the sender and receiver and is able to capture or modify traffic between them. E.g me setting up a fake wifi in a Internet cafe to steal data or insert malware secretly to those who connect to my wifi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Privilege Escalation?

A

Exploiting a design flaw in a system to gain access to resources that a normal user cannot and progressively increasing the level of credentials until reaching administrative or Kernel level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a back door?

A

A way for programmers to bypass all authentication checks for easier and quicker access. [Bad practice]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s a Logic Bomb?

A

It’s malicious software that only activates when certain conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Preventing Spam.
What do you not want your email servers configured to?
3 other things can you do to prevent spam?

A

Verify email isn’t configured as open mail relays or SMTP open relays.

  • remove emails from work website (bots collect them)
  • use whitelists and blacklists
  • train users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

info 3 musts

A

Update anti malware software automatically
Scan computer weekly
Download all patch’s for operating system and applications
Educate and train users( they’re biggest vulnerability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Dropper?

A

Malware designed to install or run other types of malware embedded in a payload on an infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s a downloader?

A

Piece of code that connects to the internet to retrieve additional tools after the initial infection via a dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s shellcode?

A

Any lightweight code designed to run an exploitation on the target, (any language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s a code injection ?

A

Exploit technique that runs malicious code with the identification number of legitimate processes

17
Q
Types of code injection;
Masquerading
DLL Injection
DLL sideloading 
Process hollowing
A

Masquerading -when your dropper replaces a genuine exe. with a malicious one.
DLL injection- where dropper forces the exe. malicious code as part of your DLL
DLL side loading - when dropper exploits vulnerability in a legit programs manifest to load malicious code when running
Process hollowing- dropper rewrites memory locations containing process code with malicious code

18
Q

What’s Living of the Land?

A

Exploit techniques that use the standard computer tools to perform intrusions making it much harder to discover