Day 3 Flashcards

1
Q

What is a trojan

A

Something disguised as a legitimate program

Two programs in one

  • -Malware
  • -Legitimate software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Covert Comm channel use what to communicate

A

IRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are Trojans normally used to add the victim to a Botnet

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fast Flux DNS

A

1`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy server Trojans

A

Allows an attacker to use your system as a proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTP Trojan

A

Allows user to save files to your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VNC Trojan

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP Trojans

A

Bypass Firewall
Spawn Child programs
Access the INternet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP RAT

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP Tunneling

A

fd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAT

A

Remote Admin Tool

Uses port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Covert Channel Trojan (CCTT)

A

Creates arbitrary transfer channel

Enables attackers to get an external server shell from witin the internal network and vice versa

Sets TCP/UDO/HTTP Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

E-banking Trojans

A

Intercepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malvertisment

A

Uses HTML to create advertisement that runs a script to install a Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TAN Grabber

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTML Injection

17
Q

Form Grabbing

18
Q

Destructive Trojan

19
Q

Notification Trojan

20
Q

Data Hiding Trojans

21
Q

Viruses are self replicating

22
Q

Do viruses attach themselves to other programs

23
Q

Do viruses need human interaction

24
Q

How are viruses transmitted

A

downloads
infected media

email attachements

25
Virus Characteristics
``` Infects other programs Corrupt files Alters data Transforms itself Encrypts itself Self Replicating ```
26
Virus cycle
``` Design Replicate Launch Detection Incorporation Elimination ```
27
Infection Phase of a virus
Adds itself to the .exe file
28
Attack phase of a virus
f
29
When a file system runs out of space what does it do
Creates a pointer to a new space Leads to fragmentation Increases latency
30
Why do people create viruses
Inflict damage Financial benefits Research projects Play prank Vandalism Cyber terrorism Distribute political messages
31
Indications of Virus attack
on slide
32
Can you get a virus by not running the latest version of the AV software
Yes
33
Ransomware
Restricts access to the computer files and folders and demands online ransom payments Cheaper to pay the ransom instead of mitigating the malware
34
What are the primary two types of viruses
What do they infect How do they infect
35
Name some What Do They Infect viruses
f
36
Name some How Do They Infect viruses
f
37
File and Multipartite Viruses
1:07:20