Chapter 9: Malware, Vulnerabilities and Threats Flashcards

1
Q

Spyware

A
  • Monitors user activity and reports it to another party

- Does not replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkits

A

Software programs that have the ability to hide certain things from the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command to display running processes in Linux

A

ps -ef | more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common file extensions that should not be allowed in your network

A
.bat
.com
.exe
.hlp
.pif
.scr
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bombs

A

Programs or code snippets that execute when a certain predefined event occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

Malicious software running on a zombie and under the control of a bot-herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Software takes control of a system and demands that a third party be paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Ways a Virus can enter your computer

A

1) Contaminated media (DVD, USB, CD)
2) Email or social networking sites
3) As part of another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Retrovirus

A

Attak or bypass the antivirus software installed on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multipartite virus

A

Attacks your system in multiple ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Armored Virus

A

Difficult to detect or analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Companion Virus

A

Attaches itself to legitimate programs and then creates a program with a different filename extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phage

A

Modifies and alters other programs and databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro

A

Exploits the enhancements made to many application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPIM and SPIT

A

Spam over instant messaging, and spam over Internet telephony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ping of Death

A

Crashes the system by sending ICMP packets that are larger than the system can handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pharming

A

Traffic intended for one host is sent to another, with the intent of pretty much phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spear Phishing

A

Form of phishing in which the message is made to look as if it came from someone you know and trust

19
Q

Vishing

A

Phishing over the phone

20
Q

Xmas Attack

A

An advanced scan that tries to get around firewall detection and look for open ports

21
Q

Replay Attack

A

The attacker captures information and replays it

22
Q

Smurf Attack

A

Spoofing the target machine’s IP address and broadcasting to that machine’s routers so that the routers think the target is sending out the broadcast. All machines try to respond and the target machine overloads

23
Q

How to stop a smurf attack?

A

Prohibit ICMP packets from passing through your router.

24
Q

Dictionary Attack

A

Uses a dictionary of common words to attempt to find a user’s password

25
Birthday Attack
Tries to find another value to be hashed and give the same result.
26
Client-Side Attack
One that targets vulnerabilities in client applications that interact with a malicious server.
27
Typo Squatting and URL Hijacking
Registering domains that are similar to those for a known entity
28
Watering Hole Attack
Identify a site visited by the target, poison that site, and wait for results.
29
Cross-Site Scripting (XSS)
Using a client-side scripting language to trick a user who visits a site into having code execute locally
30
Cross-Site Request Forgery (XSRF)
Unauthorized commands coming from a trusted user to the website, often without the user's knowledge
31
SQL Injection Attack
Entering SQL code into a field and submitting it so that it executes
32
LDAP Injection Attack
Could allow access to directories and shit when it shouldn't
33
XML Injection Attack
Can return entire documents
34
Directory Traversal Attack
An attacker is able to gain access to restricted directories through HTTP
35
Command Injection Attack
Injecting commands to carry out a directory traversal attack
36
Evercookie
A cookie that writes data to multiple locations, making it hard to remove completely
37
Locally Stored Object/Flash Cookie
Data stored on a user's computer by Adobe Flash
38
Session Hijacking
When the item used to validate a user's session, such as a cookie, is stolen and used by another to establish a session with the host
39
Header Manipulation
Uses other methods to change values in HTTP headers and falsify access. InPrivate Filtering helps prevent
40
Arbitrary Code Execution
Allowing a program to remotely accept commands and execute them
41
Banner Grabbing
Looks at the banner or header information messages sent with data to find out about systems
42
Architectural Approach
Involves using a control framework to focus on the foundational infrastructure
43
Design Review
Examines the ports and protocols used, the rules, segmentation and access control.