Ch-3 Flashcards

(4 cards)

1
Q

Types of malware

A

Ransomware - Takes control of host and demands ransom to release. Includes crypto-malware.
Trojans - Malware designed as a legitimate software.
Worms - Spread themselves
Viruses - Spread and multiply themselves
Rootkits - Designed to allow attackers backdoor access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnet C&C

A

Client-Server mode - All effected bots connect back to a host C&C. Typically connected via HTTPS for the obscurity and security.
Peer to Peer- Botnets connect to each other. Making it harder to take down a single C&C. Typically encrypted peer to peer traffic. Look for behavior-based patterns as well as large datasets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of viruses

A

Memory - remain in memory while the system is running

Non-memory - Execute and spread and the shutdown

Boot sector - Reside in the boot sector of a drive or storage media

Macro - Use macros or code inside word processing software or other tools to spread

Email - Spread via email as attachments or using flaws within the email client.

Fileless - Spread in typical ways, once in they inject themselves into memory and conduct further malicious activity, including the ability to reinfect the system at reboot. The only stored artifact of their life is the artifacts of their persistence techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious code

A

Can happen locally or remotely. They are scripts or custom built code that exploit PowerShell, bash, python, apps, plugins, and macros.
Defended by using ‘constrained language mode’, restricting macros, and restricting use of built-in programming tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly