Section 3: Malware Infections Flashcards

1
Q

Threat Vector

A

Method used by an attacker to access a victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

Method used by an attacker to gain access to a victim’s machine in order to infect it with malware (the way we get to the machine and how we infect it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three most common delivery methods for malware infections?

A

Software, messaging, and media (usbs, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a watering hole?

A

Malware is placed on a website that you know your potential victims will access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a zombie in a botnet?

A

It is one of several computers being controlled by an attacker on one computer, called a C2, or Command and Control computer. These attackers utilize the zombie computers to conduct their attacks so it looks like it’s coming from your computer, not theirs. Processor intensive functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DDoS?

A

Distributed Denial of Service attack. Attacker takes control of several machines, and they all make the request simultaneously to take a server down, or they use them to mine bitcoin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active Interception

A

Occurs when a computer is placed between the sender and receiver and is able to capture modify the traffic between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privilege Escalation

A

Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access (think about the demo with EternalBlue)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoors

A

Used to bypass normal security and authentication functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Remote Access Trojan?

A

It is malware placed by an attacker maintain persistent access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Easter Egg

A

Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic Bomb

A

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met (adjacent to easter eggs) (this is the attack used in Jurassic Park)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symptoms of infection

A

Computer is acting strangely, blue screening or locking up, restarts a lot, can’t get to files or apps anymore, strange noises, unusual error messages, display looks strange, jumbled printouts, new icons on the desktop, disappearing icons, double file extensions, AV won’t run, new files or folders, system restore doesn’t work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Removing Malware Common Practices

A

Identify symptoms of infection

Quarantine the infected systems so it won’t spread *unplug the network cable

Disable system restore (if you’re using Windows) so no one can take snapshots

Remediate the infected system (scan with AV and remove virus, rebooting in safe mode)

Schedule automatic updates and scans

Enable system restore and create a new restore point

Provide end user security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you remediate a boot sector virus?

A

Reboot the computer from an external device and scan it

Remove the drive, plug it into an external machine and scan it from there

17
Q

What are ways you can prevent viruses?

A

A good antivirus solution, update your system, a good host-based firewall, going to secure websites

18
Q

Best way to remediate a rootkit?

A

Reimage the machine

19
Q

What is the best way to remediate spam?

A

Verify your email servers aren’t configured as open mail relays or SMTP open relays

Remove email addresses from website

Use whitelists and blacklists

Train and educate end users

20
Q

What is an exploit technique?

A

Describes the specific method by which malware code infects a target host

21
Q

Most modern malware uses _________ techniques to avoid detection by signature based security software

A

Fileless

22
Q

Process that attackers commonly follow for exploitation

A

Get a dropper on their machine

Maintain access

Strengthen access

Actions on objectives (they have enough permissions that they can start doing what they want to do)

Concealment (start hiding themselves and start covering their tracks by doing things like deleting their log files)

23
Q

Dropper

A

Malware designed to install or run other types of malware embedded in a payload on an infected host

24
Q

Shellcode

A

Any lightweight code designed to run an exploit on a target (REMEMBER FOR THE TEST)

25
Q

Code Injection

A

Exploit technique that runs malicious code with the identification number of a legitimate process

26
Q

What is living off the land?

A

Exploit techniques that use standard system tools and packages to perform intrusions