Trojans and other attacks Flashcards
wrappers
program that allows you to bind an executable (malware) to the program of your choice. e.g. a game
crypters
use a combo of of encryption and and code manipulation to render malware undetectable (fud Fully undetectable)
packer
use compression to make executable smaller as less obvious to some AVs
Exploit kits (list)
Infinity, Bleeding Life, Crimepack, Blackhole
Trojans (list)
Chewbaca ( Bankbank), Skynet botnet (tor-based), RAT, MoSucker (RAT), Optix Pro (old school up to xp backdoor), Blackhole (RATs), Zues, SpyEye (e-banking)
nc -e
-e = execute Netcat command gets cmd line access to machine specified with -t (tos) connect to telnet
nc -l -p 5555
opens port 5555 in a listening state on the target machine can then nc -p 5555 to connect
netstat -an
all connections and listening port in numerical order
netstat -b
all active connections and processes or applications that are using them
Boot Sector Virus
aka system virus- moves the boot sector to another location forcing virus to be executed first.
Shell Virus
Wraps around application code running itself before the app in run
Cluster Virus
Modifies directory table entries so that user or system processes are pointed to the virus code instead of action or app intended.
Multipartite Virus
infect both boot sector and files at same time. Has multiple infection vectors
Macro virus
Usually in VBA infects MS office template files (excel or word) Melissa was an example
Polymorphic Virus
Mutates code using built in polymorphic engine