Module 3 - Threats & Attacks on Endpoints Flashcards
What word is currently accepted when referring to network-connected hardware devices?
endpoint
this term reflects the fact that devices that are connected to a network today are far more than a computing device with a keyboard and monitor
What are the five groupings used to characterize malware?
imprison - ex: ransomware, cryptomalware
launch - ex: virus, worm, bot
snoop - ex: spyware, keylogger
deceive - ex: PUPs, trojan, RAT
evade - ex: backdoor, logic bomb, rootkit
Gabriel’s sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of her computer is returned to her. What type of malware has infected her computer?
blocking ransomware
this is one of the earliest forms of malware
Marius’s team leader has just texted him that an employee has just reported that her computer is sudden locked up with cryptomalware. Why would Marius consider this a dangerous situation?
cryptomalware can encrypt all files on any network that is connected to the employee’s computer
basically any other endpoint that is connected to the network that the infected computer is connected to is vulnerable
Which type of malware relies on LOLBins?
file-less virus
a file-less virus does not attach itself to a file like a file virus would; a file-less virus takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks; the native services used in a file-less virus are called living-off-the-land binaries
Which type of malware is known as a network virus?
a worm
a worm is a malicious program that uses a computer network to replicate; it is designed to enter a computer through the network and then take advantage of a vulnerability in an application or an OS on the host computer; once the worm has exploited the vulnerability on one system, it immediately searches for another computer on the network that has the same vulnerability
What are some examples of different attacks generated through a botnet?
spamming spreading malware ad fraud mining cryptocurrencies DDOS DOS
What are some ways a bot communicates with a C & C device?
1) by signing into a bot-herding website where information has been placed that the bot knows how to interpret
2) by signing in to a 3rd party website
3) commands sent via blog posts, specially coded attack commands through twitter posts or notes posted on Facebook
4) by creating an email account and then drafting an email that is never sent but contains commands the bot receives when it logs into the email account and reads the draft
Randall’s roommate is complaining to him about all of the software that came pre-installed on his new computer. What type of software is this?
PUP (Potentially Unwanted Programs)
What is the difference between a Trojan and Remote Access Trojan (RAT)?
a RAT gives the attacker unauthorized remote access to the victim’s computer
a computer Trojan is an executable program that masquerades as performing a benign activity but also does something malicious; ex) a user might download what is advertised as a calendar program yet in addition to installing the calendar, ti also installs malware that scans the system for credit card numbers and passwords, connects through the network to remote system and then transmits that information to the attacker
a remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim’s computer by using specially configured communication protocols
Which of these would NOT be considered the result of a logic bomb?
a) send an email to Rowan’s inbox each Monday morning with the agenda of that week’s department meeting
b) if the company’s stock price drops below $50, then credit Oscar’s retirement account with one additional year of retirement credit
c) erase the hard drives of all the servers 90 days after Alfredo’s name is removed form the list of current employees
d) delete all human resource records regarding Augustine one month after he leaves the company
A) send an email to Rowan’s inbox each Monday morning with the agenda of that week’s department meeting
Which of the following attacks is based on a website accepting user input without sanitizing it?
a) RSS
b) XSS
c) SQLS
d) SSXRS
B) XSS - cross site scripting attack
Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads a another webpage, the new page inherits the identity and privileges of the first website?
a) SSFR
b) DLLS
c) CSRF
d) DRCR
C) CSRF - cross-site request forgery attack
Which of the following manipulates the trusting relationship between web servers?
a) SSRF
b) CSRF
c) EXMAL
d) SCSI
A) SSRF - server-side request forgery attack
Which type of memory vulnerability attack manipulates the “return address” of the memory location of software program?
a) shim overflow attack
b) factor overflow attack
c) integer overflow attack
d) buffer overflow attack
D) buffer overflow attack