Trojans and other attacks Flashcards

1
Q

wrappers

A

program that allows you to bind an executable (malware) to the program of your choice. e.g. a game

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

crypters

A

use a combo of of encryption and and code manipulation to render malware undetectable (fud Fully undetectable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

packer

A

use compression to make executable smaller as less obvious to some AVs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploit kits (list)

A

Infinity, Bleeding Life, Crimepack, Blackhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans (list)

A

Chewbaca ( Bankbank), Skynet botnet (tor-based), RAT, MoSucker (RAT), Optix Pro (old school up to xp backdoor), Blackhole (RATs), Zues, SpyEye (e-banking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

nc -e

A

-e = execute Netcat command gets cmd line access to machine specified with -t (tos) connect to telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

nc -l -p 5555

A

opens port 5555 in a listening state on the target machine can then nc -p 5555 to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat -an

A

all connections and listening port in numerical order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

netstat -b

A

all active connections and processes or applications that are using them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot Sector Virus

A

aka system virus- moves the boot sector to another location forcing virus to be executed first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shell Virus

A

Wraps around application code running itself before the app in run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cluster Virus

A

Modifies directory table entries so that user or system processes are pointed to the virus code instead of action or app intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multipartite Virus

A

infect both boot sector and files at same time. Has multiple infection vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Macro virus

A

Usually in VBA infects MS office template files (excel or word) Melissa was an example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Polymorphic Virus

A

Mutates code using built in polymorphic engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption Virus

A

Uses encryption to hide

17
Q

Metamorphic Virus

A

rewrites itself every time it infects new file

18
Q

Stealth Virus

A

Also tunneling virus intercepts AV’s requests to the OS and alters them and returns them to the AV as uninfected.

19
Q

Cavity Virus

A

Overwrites portions of the host file so as not to increase it’s size. It does this using the Nullcontent sections and leaves the functionality in tact

20
Q

Sparse Infector Virus

A

only infects occasionally. perhaps every 10th time the app is launched

21
Q

File extension Virus

A

changes the the file extension of files.

22
Q

Fragmentation attack

A

DOS systems inability to handle fragmented packets

23
Q

Volumetric attack

A

DOS Consume all of the available bandwidth for the system or service

24
Q

TCP state exhaustion attack

A

DOS trys to consume the connection state tables of load balancers, firewall, app servers

25
Syn attack/ syn flood
DOS thousands of syn packets but never responds to the syn/ack
26
Syn Flood
DOS thousands of syn packets but never responds to the syn/ack
27
ICMP/ ping Flood
DOS ICMP packet with fake address eventually reaches limit of packets per second PPS
28
Smurf attack
DOS sends large number of pings to the broadcast address of network from spoofed address of target machine.
29
Ping of death
DOS send ping in fragments that when assembled are is larger than max and crashes system
30
Phlashing
DOS that causes permanent damage to a system. Bricking
31
RUDY
DOS uses HTTP POST Via long form field submissions