Malware Infections Flashcards
Threat Vector
Method used by an attacker to access a victim’s machine
examples
unpatched software
phising
plugging in a USB or other multimedia
Attack Vector
Method used by an attacker to gain access to a victim’s machine
This is the way the attacker gets to the machine and how they are going to infect it
watering holes
Malware is placed on a website that you know your potential victims will access
typo squatting
embedding malware into a webpage made to look like another site
usually these are on variations of well known sites like
www.gooogle.com or www.faceboak.com
botnet
A collection of compromised computers under the control of a master node
zombie
A system that is part of a botnet
DDoS
Distributed Denial of Service attack
occurs when many machines attack a single system with several other systems simultaneously to jam the victims services.
Usually used by a botnet
active interception
occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.
privilege escalation
Occurs when you are able to exploit a design flaw or a bug in a system to gain access to resources that a normal user isn’t able to access
backdoor
used to bypass normal security and authentication functions by admins and coders
Rat
Remote Access Trojan
Placed by an attacker to maintain persistent access
Easter Egg
non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature
This is a bad security practice for coders
logic bomb
Malicious code that has been inserted inside a program and will execute only when certain conditions have been met