SB 15: Malware Flashcards

1
Q

What is a trapdoor?

A

Or “backdoor”, is a means of subverting the normal access control and even authentication of a system. Can be malicious and intentional or introduces accidentally and unintentionally by a programmer. Can be used for testing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a covert channel?

A

Any communication that violates the security policy. It can be used to move information in a way that is not intended (or allowed).

It creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate. “Hidden channels”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a trojan horse?

A

A program with an overt (documented or known) purpose and a covert (undocumented or unexpected) purpose. They generally do not try to inject themselves into other files or propagate themselves.

A propagating trojan horse, however, creates copies of itself and can insert itself into specific programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a rootkit?

A

A pernicious trojan horse. Hides itself on a system to carry out its actions without being detected.

The earliest forms of rootkits installed backdoor’s and traps, and then changed system programs that reported on the system status.

Installation can be automated or an attacker can install it after having gained root access to the system. Once installed it hides itself, the attacker then can gain full access to the system, giving them the power to change anything.

Detection methods include: alternativ OS, behavioural analysis, signature scanning. Very difficult to remove depending on where it is located, can be in the kernel or on firmware which requires re-installation of the OS or replacement of hardware components.

Examples:
Sony BMG DRM rootkit
Greek wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a computer virus?

A

Is a program that inserts (a possibly transformed version of) itself into one or more files and then performs some (possibly null) action.

1st phase: insertion
2nd phase: execution, in the execution phase there may be some form of spread condition.

Generally requires a host program.
Uses complex anti-detection/stealth mechanisms to prevent anti-virus from detecting them.

Social engineering and exploit vulnerabilites to infect systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a computer worm?

A

A program that copies itself from one computer to another.

There are generally three phases:
1. Target selection: determining what systems to attempt to spread to.
2. Propagation: an attempt to infect the chosen target.
3. Execution: once it has successfully infected the target system. It can be empty in which case it is simply spreading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bots and botnets?

A

Bot: a malware that carries out some action in coordination with other bots.

Bot-master: controls the bots.

Command & Control server: where the bots are controlled from.

C&C channels: communication paths.

Botnet: a collection of bots.

There are four stages in a bots lifecycle:
1. Infect: via worms, trojans or exploiting vulnerabilities, etc.
2. Connect: check for network connections to communicate.
3. Command: given commands to execute and download any extra components needed.
4. Execute: execute the commands, if appropriate it may send results to other sites.

3 and 4 are repeated as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is adware?

A

A trojan horse that gathers information for marketing purposes and displays ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware?

A

A trojan horse that records information about the use of a computer, usually resulting in confidential information being discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What parts in a system can a computer virus infect?

A

Boot sector: the part of a disk used to bootstrap the system or mount a disk.

Executable: infects programs and can either append or prepend itself to the program.

Data: data is interpreted as a set of instructions, and
the computer virus causes the interpreter to spread the virus.

Multipartite: can infect booth boot sector and applications. Typically consist of two parts, one for each type.

Macro: composed of a set of instructions that are interpreted rather than executed directly. Can infect executable or data. Not bound by machine architecture. I.e macro virus targeted at a Word program will only work on systems running Word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a computer virus a form of trojan horse?

A

Yes: the insertion and execution are the covert purpose of the virus, the purpose of the infected program is overt.

No: a virus has no covert purpose, its overt purpose it to infect and execute.

Either way defenses against trojan horses also defend against viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is concealment for computer viruses?

A

One of the goals of a computer virus is to remain undiscovered until executed and possibly even after that.

How concealment has been done has evolved with time to make it even more difficult to find a virus on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can a botnet be organized?

A
  1. Centralized: each bot communicates directly with the bot-master. Usually organized in a hierarchical structure. Allows control of large botnets.
  2. Peer-to-peer: uses a C&C structure where there is no single C&C server. Bots act as peers. If some part of the botnet is deleted the remainder can still continue to function.
  3. Random: To communicate, addresses are scanned at random to find another bot. Minimizes the damage if a bot is discovered.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a problem inherent with botnets?

A

The C&C addresses must be available to the bots. Discovery of any node places key servers at risk. By using knowledge of how content delivery networks work, this information can be hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly