Chapter 9: Malware, Vulnerabilities and Threats Flashcards
Spyware
- Monitors user activity and reports it to another party
- Does not replicate
Rootkits
Software programs that have the ability to hide certain things from the OS
Command to display running processes in Linux
ps -ef | more
Common file extensions that should not be allowed in your network
.bat .com .exe .hlp .pif .scr
Logic Bombs
Programs or code snippets that execute when a certain predefined event occurs.
Botnet
Malicious software running on a zombie and under the control of a bot-herder
Ransomware
Software takes control of a system and demands that a third party be paid.
3 Ways a Virus can enter your computer
1) Contaminated media (DVD, USB, CD)
2) Email or social networking sites
3) As part of another program
Retrovirus
Attak or bypass the antivirus software installed on a computer
Multipartite virus
Attacks your system in multiple ways
Armored Virus
Difficult to detect or analyze
Companion Virus
Attaches itself to legitimate programs and then creates a program with a different filename extension.
Phage
Modifies and alters other programs and databases.
Macro
Exploits the enhancements made to many application programs
SPIM and SPIT
Spam over instant messaging, and spam over Internet telephony.
Ping of Death
Crashes the system by sending ICMP packets that are larger than the system can handle.
Pharming
Traffic intended for one host is sent to another, with the intent of pretty much phishing
Spear Phishing
Form of phishing in which the message is made to look as if it came from someone you know and trust
Vishing
Phishing over the phone
Xmas Attack
An advanced scan that tries to get around firewall detection and look for open ports
Replay Attack
The attacker captures information and replays it
Smurf Attack
Spoofing the target machine’s IP address and broadcasting to that machine’s routers so that the routers think the target is sending out the broadcast. All machines try to respond and the target machine overloads
How to stop a smurf attack?
Prohibit ICMP packets from passing through your router.
Dictionary Attack
Uses a dictionary of common words to attempt to find a user’s password