Malware Flashcards

1
Q

Threat Vector

A

Method used by an attacker to access a victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Vector

A

Method used by an attacker to gain access to a victim’s machine in order to infect it with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Botnet

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Active Interception

A

Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privilege Escalation

A

Occurs when you are able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backdoors

A

Backdoors are used to bypass normal security and authentication functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote Access Trojan

A

Remote Access Trojan (RAT) is placed by an attacker to maintain persistent access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logic Bomb

A

Malicious code that has been inserted inside a program and will execute only when certain conditions have been met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Easter Egg

A

Non-malicious code that when invoked, displays an insider joke, hidden message, or secret feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dropper

A

Malware designed to install or run other types of malware embedded in a payload on an infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Downloader

Exploit Technique

A

A piece of code that connects to the Internet to retrieve additional tools after the initial infection by a dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shellcode

A

Any lightweight code designed to run an exploit on the target, which may include any type of code format from scripting languages to binary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code Injection

A
Exploit technique that runs malicious code with the identification number of a legitimate process
§ Masquerading
§ DLL injection
§ DLL sideloading
§ Process hollowing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Living Off the Land

A

Exploit techniques that use standard system tools and packages to perform intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly