Section 3 Flashcards

1
Q

There are two ways for malware to infect. What are they called?

A

Threat Vector
Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat vector?

A

Method used by an attacker to access a victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an attack vector?

A

Method used by an attacker to gain access to a victim’s machine in order
to infect it with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware infections usually start where?

A

within software, messaging, and media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a watering hole?

A

Malware is placed on a website that you know your potential victims will
access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a botnet?

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is active interception?

A

Occurs when a computer is placed between the sender and receiver and
is able to capture or modify the traffic between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is privilege escalation?

A

Occurs when you are able to exploit a design flaw or bug in a system to
gain access to resources that a normal user isn’t able to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ are used to bypass normal security and authentication functions

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoors are highly discouraged in the modern technology world however a kind of backdoor still in use is…?

A

Remote Access Trojan (RAT) is placed by an attacker to maintain persistent
access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a logic bomb?

A

a type of malicious code embedded in software that remains dormant until specific conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Easter Egg?

A

Non-malicious code that when invoked, displays an insider joke, hidden
message, or secret feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Logic bombs and Easter eggs should not be used according to secure coding standards

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some symptoms of infection?

A
  • Hard drives, files, or applications are not accessible anymore
    ▪ Strange noises occur
    ▪ Unusual error messages
  • Display looks strange
    ▪ Jumbled printouts
    ▪ Double file extensions are being displayed, such as textfile.txt.exe
    ▪ New files and folders have been created or files and folders are
    missing/corrupted
    ▪ System Restore will not function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the ways that you can remove malware?

A
  • Identify symptoms of a malware infection
    o Quarantine the infected systems
    o Disable System Restore (if using a Windows machine)
    o Remediate the infected system
    o Schedule automatic updates and scans
    o Enable System Restore and create a new restore point
    o Provide end user security awareness training
    o If a boot sector virus is suspected, reboot the computer from an external device
    and scan it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the best way to prevent a virus?

A

Anti-virus program like Norton or McAfee or using your computers Window Defender from your operating system

Continue to do service packs and updates from your operating system (patches)

Have a good host base firewall

When surfing the internet use encrypted websites

17
Q

The best way to detect worms, trojans and ransomware is…?

A

Using anti-malware solutions. Ensure to keep your anti-malware solution up to date and current both for its definition and scanning engine.

18
Q

What is the best way to prevent spyware?

A

Anti-spyware product. There are third-party products you can buy but Windows Defender already has this capability built into it. Make sure your definitions are up to date when using this so it can scan and detect properly.

Additionally, when browsing the internet make sure your browser security settings are set to non-trusted method. This means you won’t accept pop-ups or cookies.

19
Q

How do you prevent rootkits?

A

Scanners can detect a rootkit before it is installed

If the rootkit has already been installed you will need to run a scan by booting from an external device. You most likely will want to reimage your machine

20
Q

How do you prevent spam?

A

Verify your email servers aren’t configured as open mail relays or SMTP open
relays

Remove email addresses from website

Use whitelists and blacklists

Train and educate end users

21
Q

What are the three best practices to remember when it comes to preventing malware?

A
  • Update your anti-malware software automatically and scan your
    computer
    ▪ Update and patch the operating system and applications regularly
    ▪ Educate and train end users on safe Internet surfing practices
22
Q

What is a malware exploit technique?

A

Describes the specific method by which malware code infects a target host

23
Q

Most modern malware uses ___ techniques to avoid detection by signature-based security software

A

fileless (By being fileless, this means that the malware is executed directly as a script or a small piece of shellcode that creates a process in the system memory without having to use the local file system.)

24
Q

How does an APT use modern malware to operate?

A

Step 1: Dropper or Downloader - Now, a dropper is a specialized type of malware that’s designed to install or run other types of malware embedded in a payload on an infected host. Usually, this will be a stage one dropper, it’s that code you first got. And once you get that code and run it, it’s then going to go out and get some other code, and it uses a downloader do that. Now, a downloader is a piece of code that connects to the Internet to retrieve additional tools after the initial infection happens by a dropper.

Step 2: Maintain Access -
Step 3: Strengthen Access -
Step 4: Actions on objectives -
Step 5: Concealment -

25
Q

What is a dropper?

A

Malware designed to install or run other types of malware embedded in a
payload on an infected host

26
Q

What is a downloader?

A

A piece of code that connects to the Internet to retrieve additional tools after the
initial infection by a dropper

27
Q

What is shellcode?

A

Any lightweight code designed to run an exploit on the target, which may include
any type of code format from scripting languages to binary code

28
Q

What is code injection?

A

Exploit technique that runs malicious code with the identification number of
a legitimate process

*** Code injection is an exploit technique that runs malicious code with the identification number of a legit process. So, when I go to install this code, you’re going to notice that every process has a unique ID number with it. And so, if I have something that is allowed to run like the Explorer for Windows, and I decide to run malware and make you think I’m running it as the Explorer for Windows, I can hide that malware by injecting the code into that.That’s the idea of code injection.

29
Q

What are some code injection techniques?

A
  • Masquerading
    ▪ DLL injection
    ▪ DLL sideloading
    ▪ Process hollowing
30
Q

How does masquerading code injection work?

A

Where your dropper is going to replace a genuine executable with a malicious one.

31
Q

How does DLL code injection work?

A

Where the dropper starts forcing a process to load as part of the DLL. So, it’s going to load the DLL in the executable malicious code.

32
Q

How does DLL sideloading work?

A

This is where the dropper is going to exploit a vulnerability in a legitimate program’s manifest to load a malicious DLL at runtime, and essentially you sideload by making it load this malicious thing.

33
Q

How does process hollowing work?

A

This is when a dropper starts a process in a suspended state, and then rewrites the memory locations containing the process code with the malware code. So, essentially, we’re taking over someplace in memory and putting our malicious code in there.

34
Q

Droppers are likely to implement ____ techniques to prevent detection and analysis

A

anti-forensics

When we talk about anti-forensic techniques, this is things like encrypting their payloads, or compressing their payloads, or obfuscating their payloads.

35
Q

Exploit techniques that use standard system tools and packages to perform
intrusions

A

Living off the Land

For instance, they might use something like this, which is PowerShell. PowerShell can be used to do all sorts of malicious activities. And so, what we can do is, when we break into a system as a pentester or as an attacker, we can actually use your own PowerShell against you. If I’m on a Linux system, I can’t use PowerShell, but I can use Bash scripting. And so, again, if I use the tools that are native to your operating system, I am now using tools that were already installed for your administrators. And I’m using them in a malicious way. But it’s going to be really hard for you to detect that because I’m living off the land. So, if you fall victim to an attacker who is used to living off the land, the detection of that adversary is going to be much more difficult because they’re executing malware code within those standard tools and processes. And that makes it really hard to detect, and it’s going to allow them to stay on your system a lot longer.

36
Q

What is APT?

A

An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data.