Chapter 8: Malicious Code and Application Attacks Flashcards Preview

CISSP > Chapter 8: Malicious Code and Application Attacks > Flashcards

Flashcards in Chapter 8: Malicious Code and Application Attacks Deck (42):
1

What is a "script kiddie"?

A malicious individual who doesn't understand the technology behind security vulnerabilities but downlaods ready-to-use software from the Internet and uses them to launch attacks against remote systems.

2

Describe the Zeus trojan horse.

Zeus is widely believed to be the product of an Eastern European organized crime ring seeking to infect as many systems as possible to log keystrokes and harvest online banking passwords. The Zeus outbreak started in 2007 and continues today.

3

What is a computer virus?

A virus is malicious code that spreads from system to system aided by unsuspecting computer users seeking to share data.

4

What is the MBR?

MBR is the Master Boot Record, which is the bootable portion of a hard disk that contains information used to load the operating system during the boot process.

5

What is a MBR virus?

A virus which attacks the master boot record. Since the MBR is very small, these viruses generally store most of their code elsewhere.

6

What is a file infector virus?

A virus which infects executable files, such as .exe and .com files. They typically slightly alter the targeted file, but may entirely replace it.

7

What is a companion virus?

A virus that doesn't change the original binary, but uses a similar but different filename. For example, game.com instead of game.exe.

8

What is a macro virus?

A virus executed in an application's scripting language. Melissa in Word, 1999. I Love You, 2000.

9

What is a service injection virus?

A virus which injects itself into trusted runtime processes like svchost.exe, winlogin.exe, or explorer.exe. This helps these viruses escape detection by antivirus software.

10

What is the best technique to defend against service injection?

Keeping all software that can view web content up to date. (browsers, media players, helper applications)

11

What is the zero day problem?

Antivirus is an arms race, with AV always trying to keep up with evolving threats. Day 0 exploits don't have patches or detection mechanisms simply because they're new.

12

How do most antivirus packages work?

Most use signature detection. This is essentially a large database that contains the telltale characteristics of all known viruses.

13

What is a multipartite virus?

A virus that uses more than one propagation technique to attempt to penetrate systems that only defend against one or a few techniques.

14

What is a stealth virus?

A virus that hide by tampering with the OS to fool antivirus packages.

15

What is a polymorphic virus?

A virus that actually modifies it's own code as it travels from system to system. The propagation and destruction techniques remain unchanged, but this signature changes to make detection more difficult.

16

What is an encrypted virus?

A virus that uses cryptographic techniques to avoid detection.

17

What is a logic bomb?

A malicious code object that infects a system and lies dormant until it is triggered by the occurrence of one or more events.

18

What is a trojan horse?

A program that appears benefolent but carries a malicious, hidden payload.

19

What is a worm?

A malicious code object that can propagate without human interaction.

20

What did the Code Red worm do?

Randomly selected hundreds of IPs to attack, probed them for vulnerable versions of IIS, defaced the web serer with "Welcome to http:///www.worm.com! Hacked by Chinese!", and planted a logic bomb that would DoS an IP that belonged to whitehouse.gov.

21

What was Robert Morris's punishment for the famous Morris worm?

3 years probation, 400 hours community service, $10,000 fine under the DFAA of 1986.

22

What was Robert Morris's dad's job?

He was director of the National Security Agency's Computer SEcurity Center.

23

What is Stuxnet?

A highly sophisticated worm that was discovered in 2010. It searched for unprotected administrative shares on the local network, exploited zero day vulnerabilities in Windows Server and Print Spooler services, connected to systems using a default database password, or spread by infected USB drive.

Stuxnet spread widely, but was looking for systems using a controller manufactured by Siemens and allegedly used in the production of material for nuclear weapons. When it found such a system, it deployed a payload intended to destroy centrifuges attached to the controller.

24

What is spyware?

Malicious code that monitors your actions and transmits important details to a remote system that spies on your activity.

25

What is adware?

Malicous code that uses a variety of techniques to display ads on infected computers.

26

What's the best malicious code countermeasure for client systems?

Updated antivirus software that searches local storage for viruses.

27

What are the solutions to signature-based antivirus problems?

Integrity checking software like tripwrie and access controls that limit the ability of malicious code to damage data.

28

What other techniques can prevent systems from being infected by malicous code?

Sandboxing, like Java.
ActiveX control signing to insure code comes from a trusted source
Whitelisting applications at the operating system level, which requires administrators specifically approving applications.

29

List password attacks

Password guessing
Dictionary attacks
Social engineering

30

What is the cornerstone of any security program?

Education

31

List the application attacks

Buffer overflow
time-of-check to time-of-use
back doors
escalation of privileges and rootkits

32

What is a buffer overflow

It's an input validation error where an external input is allowed to be longer than the internal space allocated for it

33

Describe the time-of-check to time-of-use attack

It's a timing vulnerability where access permissions are checked too far in advance of a resource request.

34

What is a back door?

An undocumented command sequence that allows an individual with knowledge of it to bypass normal security restrictions

35

What is escalation of privilege?

.

36

What is a rootkit?

.

37

How does cross-site-scripting (XSS) work?

.

38

How does SQL injection work?

.

39

How do you defend against SQL injection?

input validation, limit account privs, use stored procedures

40

List the reconnaissance attacks

IP probes
port scans
vulnerability scans
dumpster diving

41

List the masquerading attacks

IP spoofing
Session hijacking

42

What is a masquerading attack?

.