Lesson 4 - Social Engineering & Malware Flashcards
What is pharming?
Passive means of redirecting users from a legitimate website to a malicious one.
Relies on corrupting the way the victim’s computer performs name resolution, so they are redirected from the genuine site to the malicious one.
Which situation would require keyboard encryption software be installed on a computer?
Protect against spyware
A hacker is able to install a keylogger on a user’s computer. What is the hacker attempting to do in this situation?
Steal confidential information
What is shellcode?
Fileless malware used to achieve a backdoor mechanism on the host.
Recompiled in an obfuscated form to evade detection by scanners.
What does a script virus typically target?
Vulnerabilities in an interpreter; PDFs have become a popular vector for script viruses.
Virus that attacks the disk boot sector information, the partition table, and sometimes the file system.
Boot Sector
Memory-resident malware that can run without user intervention and replicate over network resources.
Computer Worm
What is spyware?
Malware that can perform adware-like tracking, but also monitor local application activity, take screenshots, and activate recording devices.
Process of administering cryptographic keys and managing their usage, storage, expiration, renewal, revocation, recovery, and escrow.
Key Management
What is characterized by its ability to hide itself by changing core system files and programming interfaces and to escalate privileges?
Rootkit
Actor registers a domain name that is very similar to a real one hoping users will not notice the difference.
Typosquatting
What is a “Watering Hole Attack”?
A passive technique that relies on a group of targets using an unsecure third-party website.
The threat actor does not have to risk communicating directly with the target.