Trojans and other attacks Flashcards

1
Q

wrappers

A

program that allows you to bind an executable (malware) to the program of your choice. e.g. a game

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

crypters

A

use a combo of of encryption and and code manipulation to render malware undetectable (fud Fully undetectable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

packer

A

use compression to make executable smaller as less obvious to some AVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploit kits (list)

A

Infinity, Bleeding Life, Crimepack, Blackhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans (list)

A

Chewbaca ( Bankbank), Skynet botnet (tor-based), RAT, MoSucker (RAT), Optix Pro (old school up to xp backdoor), Blackhole (RATs), Zues, SpyEye (e-banking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nc -e

A

-e = execute Netcat command gets cmd line access to machine specified with -t (tos) connect to telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

nc -l -p 5555

A

opens port 5555 in a listening state on the target machine can then nc -p 5555 to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat -an

A

all connections and listening port in numerical order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

netstat -b

A

all active connections and processes or applications that are using them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot Sector Virus

A

aka system virus- moves the boot sector to another location forcing virus to be executed first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shell Virus

A

Wraps around application code running itself before the app in run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cluster Virus

A

Modifies directory table entries so that user or system processes are pointed to the virus code instead of action or app intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multipartite Virus

A

infect both boot sector and files at same time. Has multiple infection vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro virus

A

Usually in VBA infects MS office template files (excel or word) Melissa was an example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Polymorphic Virus

A

Mutates code using built in polymorphic engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption Virus

A

Uses encryption to hide

17
Q

Metamorphic Virus

A

rewrites itself every time it infects new file

18
Q

Stealth Virus

A

Also tunneling virus intercepts AV’s requests to the OS and alters them and returns them to the AV as uninfected.

19
Q

Cavity Virus

A

Overwrites portions of the host file so as not to increase it’s size. It does this using the Nullcontent sections and leaves the functionality in tact

20
Q

Sparse Infector Virus

A

only infects occasionally. perhaps every 10th time the app is launched

21
Q

File extension Virus

A

changes the the file extension of files.

22
Q

Fragmentation attack

A

DOS systems inability to handle fragmented packets

23
Q

Volumetric attack

A

DOS Consume all of the available bandwidth for the system or service

24
Q

TCP state exhaustion attack

A

DOS trys to consume the connection state tables of load balancers, firewall, app servers

25
Q

Syn attack/ syn flood

A

DOS thousands of syn packets but never responds to the syn/ack

26
Q

Syn Flood

A

DOS thousands of syn packets but never responds to the syn/ack

27
Q

ICMP/ ping Flood

A

DOS ICMP packet with fake address eventually reaches limit of packets per second PPS

28
Q

Smurf attack

A

DOS sends large number of pings to the broadcast address of network from spoofed address of target machine.

29
Q

Ping of death

A

DOS send ping in fragments that when assembled are is larger than max and crashes system

30
Q

Phlashing

A

DOS that causes permanent damage to a system. Bricking

31
Q

RUDY

A

DOS uses HTTP POST Via long form field submissions