Theory Test 2 Flashcards

Malware and Footprinting

1
Q

Malware Types

A

Virus, worms, trojans, RATs, spyware, scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Goals of hacking besides financial gain

A

Destroy/corrupt data, steal data, DoS, bandwidth issues, shutdown a network/system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Viruses

A

Attach to files, replicate through exe (needs a host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro Viruses

A

Viruses written in programming language which is embedded in a software app (eg MS Word)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Standalone computer program that replicates in order to spread through a computer network (doesn’t need host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Morris Worm

A

1988, considered the first internet worm. Designed for UNIX and did not contain malicious payload. Directed to copy to a computer even if it already contains the worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Slammer Worm

A

Exploited buffer overflow in SQL server, doubles number of infected hosts every 8 sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Conficker Worm

A

Uses HTTP on a non standard port to call to 50 000 possible domains to download more malware from servers. Identifies and disables virus and malware scanners and Windows services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojans

A

More than 80% of malware, includes backdoors, ransomware, rootkits, spyware, infostealers and malware downloaders. Disguised as useful programs (must be run by user) and allow remote access/control. Uses ports that can be targeted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backdoor Programs

A

Remote access program installed on user computer allowing attacker to control behaviour of the computer (aka Remote Access Trojans, RATs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sub7

A

Backdoor program/RAT, mainly used for mischief but can be used to steal confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Back Orifice

A

Remote control Microsoft Windows system widely used by script kiddies due to easy installation and GUI features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Net Bus

A

Server must be installed and run on the computer that should be remote controlled. When started it installs on host and modifies Windows registry to start automatically on startup. Is a process listening on ports 12345 or 12346

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Footprinting

A

The first and most convenient technique hackers use to gather information about computer systems and the entities they belong to. It is a passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ZAP

A

Zed Attack Proxy, one of the world’s most popular free security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering

A

Using knowledge of human nature to get info from people through persuasion, intimidation, coercion, and extortion. Use: urgency, status quo, kindness, position of authority

17
Q

Spyware

A

Type of malware that sends info from infected computer to the attacker. Can track activity, register keystrokes, and steal info

18
Q

Whois (windows program/site)

A

Footprinting tool that gathers ip and domain info

19
Q

Whois (Linux command)

A

Query databases that store registered users, same as whois sites

20
Q

Host (Linux command)

A

DNS lookups, convert names to ip address and vice versa

21
Q

Dig (Unix/Linux command)

A

Query DNS servers for info, troubleshoot and DNS lookups. Has replaced “host” command

22
Q

Shoulder Surfing

A

Reading user entry. Tools: Strategic positioning, key positions and typing techniques, hidden cameras

23
Q

Drive Disposal Canadian Standard

A

Overwrite 3 times