Theory Test 2 Flashcards
Malware and Footprinting
Malware Types
Virus, worms, trojans, RATs, spyware, scareware
Goals of hacking besides financial gain
Destroy/corrupt data, steal data, DoS, bandwidth issues, shutdown a network/system
Viruses
Attach to files, replicate through exe (needs a host)
Macro Viruses
Viruses written in programming language which is embedded in a software app (eg MS Word)
Worms
Standalone computer program that replicates in order to spread through a computer network (doesn’t need host)
Morris Worm
1988, considered the first internet worm. Designed for UNIX and did not contain malicious payload. Directed to copy to a computer even if it already contains the worm
Slammer Worm
Exploited buffer overflow in SQL server, doubles number of infected hosts every 8 sec
Conficker Worm
Uses HTTP on a non standard port to call to 50 000 possible domains to download more malware from servers. Identifies and disables virus and malware scanners and Windows services
Trojans
More than 80% of malware, includes backdoors, ransomware, rootkits, spyware, infostealers and malware downloaders. Disguised as useful programs (must be run by user) and allow remote access/control. Uses ports that can be targeted
Backdoor Programs
Remote access program installed on user computer allowing attacker to control behaviour of the computer (aka Remote Access Trojans, RATs)
Sub7
Backdoor program/RAT, mainly used for mischief but can be used to steal confidential info
Back Orifice
Remote control Microsoft Windows system widely used by script kiddies due to easy installation and GUI features
Net Bus
Server must be installed and run on the computer that should be remote controlled. When started it installs on host and modifies Windows registry to start automatically on startup. Is a process listening on ports 12345 or 12346
Footprinting
The first and most convenient technique hackers use to gather information about computer systems and the entities they belong to. It is a passive reconnaissance
ZAP
Zed Attack Proxy, one of the world’s most popular free security tools