Trojans and other attacks Flashcards
wrappers
program that allows you to bind an executable (malware) to the program of your choice. e.g. a game
crypters
use a combo of of encryption and and code manipulation to render malware undetectable (fud Fully undetectable)
packer
use compression to make executable smaller as less obvious to some AVs
Exploit kits (list)
Infinity, Bleeding Life, Crimepack, Blackhole
Trojans (list)
Chewbaca ( Bankbank), Skynet botnet (tor-based), RAT, MoSucker (RAT), Optix Pro (old school up to xp backdoor), Blackhole (RATs), Zues, SpyEye (e-banking)
nc -e
-e = execute Netcat command gets cmd line access to machine specified with -t (tos) connect to telnet
nc -l -p 5555
opens port 5555 in a listening state on the target machine can then nc -p 5555 to connect
netstat -an
all connections and listening port in numerical order
netstat -b
all active connections and processes or applications that are using them
Boot Sector Virus
aka system virus- moves the boot sector to another location forcing virus to be executed first.
Shell Virus
Wraps around application code running itself before the app in run
Cluster Virus
Modifies directory table entries so that user or system processes are pointed to the virus code instead of action or app intended.
Multipartite Virus
infect both boot sector and files at same time. Has multiple infection vectors
Macro virus
Usually in VBA infects MS office template files (excel or word) Melissa was an example
Polymorphic Virus
Mutates code using built in polymorphic engine
Encryption Virus
Uses encryption to hide
Metamorphic Virus
rewrites itself every time it infects new file
Stealth Virus
Also tunneling virus intercepts AV’s requests to the OS and alters them and returns them to the AV as uninfected.
Cavity Virus
Overwrites portions of the host file so as not to increase it’s size. It does this using the Nullcontent sections and leaves the functionality in tact
Sparse Infector Virus
only infects occasionally. perhaps every 10th time the app is launched
File extension Virus
changes the the file extension of files.
Fragmentation attack
DOS systems inability to handle fragmented packets
Volumetric attack
DOS Consume all of the available bandwidth for the system or service
TCP state exhaustion attack
DOS trys to consume the connection state tables of load balancers, firewall, app servers
Syn attack/ syn flood
DOS thousands of syn packets but never responds to the syn/ack
Syn Flood
DOS thousands of syn packets but never responds to the syn/ack
ICMP/ ping Flood
DOS ICMP packet with fake address eventually reaches limit of packets per second PPS
Smurf attack
DOS sends large number of pings to the broadcast address of network from spoofed address of target machine.
Ping of death
DOS send ping in fragments that when assembled are is larger than max and crashes system
Phlashing
DOS that causes permanent damage to a system. Bricking
RUDY
DOS uses HTTP POST Via long form field submissions