Lecture 21: Malware and attacks Flashcards

1
Q

What are some examples of what can occur in malware and cyber attacks?

A

export, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the goals of malware and cyber attacks?

A

1) disabling the target computer or knocking it offline

2) getting access to the target computer’s data and perhaps gaining admin privileges on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the attack methods for malware and cyber attacks?

A
social engineering
hacking and cracking
viruses and worms
trojan horses
denial of service (DoS) attacks
rootkits
blended treats
zero-day attacks
bots and botnets
buffer overflow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is social engineering?

A

persuading someone to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is hacking and cracking?

A

guessing, corrupting or stealing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a viruses i.t.o malware?

A

propagates by inserting a copy of itself into and becoming part of another programme e.g. Melissa, CryptoMix

executable piece of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm i.t.o malware?

A

replicates functional copies of itself but does not require a host program’s help to propagate e.g. WannaCry, Code-Red, Nimda, Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan horse?

A

harmful piece of software that looks legitimate –> backdoor trojan, downloader trojan, ransom trojan

normally waiting to be downloaded or installed by a user and then executing attack e.g. email attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are network layer attacks?

A

IP spoofing (masquerading), sequencing number prediction, TCP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are web-based attacks?

A

cross-site scripting, cooking poisoning, SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of DoS operating system attacks?

A

Ping of Death, Tear Drop, Land, Snork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of DoS network attacks?

A

SYN flood, TCP fin/rst, Smurf, Coke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of DoS distributed Dos attacks?

A

Cayosin, TCP Flood, Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is are some examples of social engineering attacks?

A

1) phishing attacks on bank customers
2) inviting someone to log into a bogus website –> spoofed bank website
3) impersonating a new employee who has forgotten user ID and/or password
4) impersonating a technician support staff member and requesting a user to “check” accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do social engineering attacks commonly persuade someone to do?

A

run/install malicious or subverted software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline what a spear phishing attack involves

A

1) email appearing to be from an individual or business that users know
2) looking for credit card and bank account numbers, passwords, and other financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of attack is a spear phishing attack?

A

social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Outline hacking and cracking

A

password discovery by trying default passwords e.g. “guest”

password cracking tools, readily available from the internet for a wide range of password protection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the password attacks?

A

1) brute force attacks

2) dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a brute force password attack?

A

try every combo for a password with few characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a dictionary attack?

A

for real-word passwords, use database of passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What tools can be used for doing password attacks?

A

CRACK, L0phtcrack, John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are one-time passwords (OTPs)? Why is it valuable?

A

an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session.

An OTP is more secure than a static password, especially a user-created password, which can be weak and/or reused across multiple accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do viruses travel and spread?

A

attaching itself to legitimate executable programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do viruses cause?

A

some unexpected and usually undesirable behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Give an example of how viruses can automatically spread to other computer users?

A

tranfering infected files via email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Do worms run independently ?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How can a worm propagate a complete working version of itself onto other host on a network?

A

usually by exploiting software vulnerabilities in the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Do trojan horses use infected files or propagation?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does installing a trojan horse allow the attacker to access?

A

user’s machine remotely via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the components of a trojan horse?

A

1) client application run on the attacker’s computer

2) server application run on the victim’s computer

32
Q

Once a trojan horse is install/downloaded by the victim, what is the next step in the attack?

A

Computers on network are scanned to locate any with a trojan installed, creating a botnet

33
Q

What is botnet short for?

A

Robot network

34
Q

Outline the Zeus trojan horse attack

A

Stealing banking information by keystroke logging

Spreading through drive-by downloads and phishing
schemes

Compromising thousands of accounts on websites of
companies

largest botnet on the Internet –> million of compromised
computers (3.6 million in USA)

35
Q

What is the intention of a DoS attack?

A

Making network services unavailable to users

rather than gaining illegal access

36
Q

How does a DoS attack make the network unavailable?

A

Flooding attacks overload servers

37
Q

What are some examples of DoS attacks?

A

Ping o’ Death, SYN flood, ICMP redirect

messages

38
Q

What does a DoS attacker threaten the victim with?

A

Financial incentive and extorsion

39
Q

Is there a solution to prevent DoS attacks?

A

No magic solution

1) Sharing services across different servers
2) Using a properly configured firewall

40
Q

Explain the process of a normal TCP connection setup

A

TCP SYN-ACK sequence:

client: “may I have a connection?”
server: “I’ll set aside one just for you”
client: “great, I’ll take it”

41
Q

Explain the process of an abnormal TCP connection setup

A

TCP SYN-ACK sequence:

client: “may I have a connection?”
server: “I’ll set aside one just for you”
server: “do you still want this connection?”

42
Q

Explain the process of an organised DoS attack

A

TCP SYN-ACK sequence:

client: “may I have a connection?”
server: “I’ll set aside one just for you”
server: “do you still want this connection?” REPEATED to all clients

Over time, other requests will not be serviced (too busy with pending requests)

System locks up, does not really die (just impaired)

43
Q

What are rootkits?

A

Collection of programs that hackers use to mask intrusion

and obtain admin access

44
Q

What must an intruder obtain before installing a rootkit?

A

after obtaining user-level

access

45
Q

How can an intruder obtainer user-level access in order to install a rootkit?

A

By exploiting known vulnerability or cracking password

46
Q

What is the goal of a rootkit attack?

A

Collecting user IDs and passwords to other machines on

the network –> Thus giving the hacker root/privilege access

47
Q

What are the utilitises of rootkits?

A

1) Monitoring traffic and keystrokes
2) Creating a “backdoor” into the system for hacker’s use
3) Altering log files
4) Attacking other machines on the network
5) Altering existing system tools to circumvent detection

48
Q

Comment on the availability of rootkits on operating systems

A

Available for a number of operating systems.

49
Q

Comment on rootkits’ detectivity

A

Increasingly difficult to detect on any network

50
Q

What is a blended threats attack?

A

Software exploit that involves a combination of attacks against
different vulnerabilities

51
Q

What vulnerabilities can blended threats attack involve?

A

1) Worms dropping parasitic viruses
2) Destructive trojan horses
3) Password stealers
4) Remote access trojans (RATs)
5) Trojanised applications replacing legitimate system tools
6) Multiplatform attacks
- -> I Payloads affecting multiple platforms
- -> I Linux worms with drop.exe trojans
7) Advanced persistent threats (APTs)

52
Q

What is a RAT?

A

remote access trojans

Malware threat

53
Q

What were RATs previously used in? Where are they used now?

A

attacks against energy
sectors

Now aimed at organizations using/developing industrial
applications and machines

54
Q

What is Havex?

A

Distributed new version of a RAT

55
Q

Briefly outline Havex

A

Discovered in 2013 by F-Secure

Hacking into websites of industrial control system (ICS)
manufacturers and poisoning their software downloads

56
Q

What does APT stand for?

A

Advanced persistent threats

57
Q

What are APTs?

A

Set of stealthy and continuous computer hacking
processes. Involving humans in real-time

Sophisticated techniques using malware to exploit
vulnerabilities in systems

External command and control, continuously monitoring
and extracting data off a specific target

58
Q

What do APTs target? Why?

A

organizations for business motives and nations

for political motives

59
Q

What do APTs require?

A

a high degree of covertness over a long period

of time

60
Q

What are examples of APTs?

A

Stuxnet, Duqu, Sandworm, BlackEnergy

61
Q

Outline what zero-day attacks take advantage of

A

1) software vulnerabilities for which there
is no available fix

2) flaws before software makers can fix
them

62
Q

What do zero-day attacks emphasise?

A

e importance of safe configuration policies

and good incident reporting systems

63
Q

Explain the blaster worm zero-day attack

A

One of the most virulent ever

Hitting the Internet barely one month after Microsoft
released a patch for the flaw it exploited

64
Q

Explain the nachi worm zero-day attack

A

A variant of Blaster worm

Carrying a dangerous payload.

Hitting users less than a week later

65
Q

Comment on the timelines of zero-day attacks

A

collapsing –> Only a matter of time before users see attacks against flaws not yet discovered or for which no patches are available

66
Q

Explain the diagram on slide 27 of set 22 about the zero-day attacks getting closer

A

TODO

67
Q

Give an overview of a bot

A

Derived from the word “robot”

Also called webcrawler

Software agent interacting with other network services intended for people as if it were a real person

Typical use is gathering information

68
Q

Give an overview of a botnet

A

Collection of software bots, running autonomously

Usually a collection of compromised machines running worms, trojans or backdoors

69
Q

What is the buffer overflow attack used for?

A

to gain remote execution on host

70
Q

What does the buffer overflow attack take advantage of?

A

inadequate buffer boundary checking in applications/services

71
Q

What does a buffer attack often involve?

A

overwriting return addresses on the stack

sending executable code as binary data within
the attack data stream –> Usually carefully crafted to be located at specific position
within a buffer

72
Q

What type of attack is the heartbleed bug?

A

buffer overflow attack

73
Q

Outline what the heartbleed bug is

A

Bug in the OpenSSL’s implementation of the SSL/TLS
heartbeat extension

When exploited, it leads to the leak of memory contents
from the server to the client and from the client to the
server

74
Q

Comment on the scale of the heartbleed attack

A

Well-known bug in SSL/TLS

75
Q

What is the heartbleed bug exploited for?

A

to access memory

  • -> Secret cryptographic keys
  • -> User names, passwords, their contents
76
Q

Is the heartbeat bug public knowledge?

A

yes –> Supposed to exist at least 2 years before discovery