Malware, Hacker Exploits, and Encryption Flashcards
What is Malware (Malicious Code)?
software or code deliberately written and released for the purpose of causing unwanted actions
What can malware do?
Can be destructive, create back doors on a network, locate and steal sensitive info, etc.
What are the two most common ways to get Malware?
Email Attachments
Web Links in emails, instant message, facebook, etc.
What does a Virus do?
Replicates by attaching to a program of file, spread by humans
Spreads from Computer to Computer through user action (downloading, copying, running file)
Passed through emails, disks, peer to peer, visiting infected websites
What does a Worm do?
Replicates and contains a payload like a virus
Can spread over a network without any user action
Difference between a worm and virus?
Difference is a worm is self reliant and does not need to attach itself to a program
What is a Trojan Horse?
Malicious software that is disguised as legitimate (tricks users into opening or running it)
What is social engineering?
non-technical, human deception to further goals or aims to get access to a system that they aren’t authorized to access.
What is a “Key Logger”?
devices that capture every key typed by the victim including space, back space, return, etc.
Are Key Stroke Loggers hardware or software?
They can be both, but usually they are software
Where are key stroke loggers most common?
public computers
What are “Script Kiddies”?
Derogatory slang word that refers to beginner hackers who go to websites and copy the code instead of creating it themselves
What are Zero Day Exploits?
Initial periods of time from where the hacker tool or exploit is released, until the security team comes up with a counter measure
What is “Google Hacking”?
Using google or any other search engine to further your hacking activity
What is Port Scanning?
Scanning your targets ports to see which ones are open
What is Port Sweeping?
Interested in one port, usually for a specific target and see if that port is open and if target is using that port
Info Gathering:
What is Operation System and Resource Discovery?
Find out what hardware and software your target is using so the hacker can find exploits in these items
Info Gathering:
What is “Escalation of Privilege” in the steps of Attack Methodology?
Looking for higher levels of power accounts that allow you access to more things or access more information
ultimately an attacker will want “Administrator” or “Root” access
Info Gathering:
What is “Housekeeping” in the steps of Attack Methodology?
Attempting to erase signs that they were ever in the system (Using root kits, log deletion or alteration)
Password Cracking:
What is a Dictionary Attack?
tries every word in a predetermined dictionary
Password Cracking:
What is Brute Force Attack?
tries every combination of letter, #’s, and characters on the keyboard (a, aa, aaa, ab, aab, etc)
Password Cracking:
What is a Popular Password Attack?
choosing a Geographical area and picking a word that you think a lot of people would use as a password and run it (ex. DC area using “Redskins” as a password)
What are “Exploits”?
Tools or techniques that take advantage of flaws (vulnerabilities) in software or hardware, or poor network design/security
What are “Input Validation Attacks”?
Class of hacking tool/technique where a user enters data into software/environment/website to see what might happen
occurs when software or system is not properly checking input from the outside world
Most common is SQL