Podcast
Questions and Answers
Malware can be distributed through social engineered click-jacking.
Malware can be distributed through social engineered click-jacking.
True (A)
A Trojan horse can only delete files on a computer.
A Trojan horse can only delete files on a computer.
False (B)
Drive-by downloads exploit flaws in browser software to install malware.
Drive-by downloads exploit flaws in browser software to install malware.
True (A)
Adware is a type of malware that typically only delivers advertisements to users.
Adware is a type of malware that typically only delivers advertisements to users.
Compromised legitimate websites are a method used by hackers to distribute malware.
Compromised legitimate websites are a method used by hackers to distribute malware.
A wrapper binds a Trojan executable with a visible .EXE application.
A wrapper binds a Trojan executable with a visible .EXE application.
A Botnet Trojan infects a single computer to control it for various attacks.
A Botnet Trojan infects a single computer to control it for various attacks.
A Command Shell Trojan allows an attacker to gain remote control of a victim's command shell.
A Command Shell Trojan allows an attacker to gain remote control of a victim's command shell.
Changing a Trojan's syntax can help it evade detection by antivirus software.
Changing a Trojan's syntax can help it evade detection by antivirus software.
Viruses are non-replicating programs that do not attach themselves to other software.
Viruses are non-replicating programs that do not attach themselves to other software.
A computer worm can replicate itself but cannot attach to other programs.
A computer worm can replicate itself but cannot attach to other programs.
Computer viruses can be detected using signature detection methods.
Computer viruses can be detected using signature detection methods.
One reason people create computer viruses is for financial benefits.
One reason people create computer viruses is for financial benefits.
Users can prevent infections by installing pirated software.
Users can prevent infections by installing pirated software.
The stages of a virus life include design, replication, launch, detection, incorporation, and elimination.
The stages of a virus life include design, replication, launch, detection, incorporation, and elimination.
A worm requires human interaction to spread across networks.
A worm requires human interaction to spread across networks.
Antivirus software developers assimilate defenses against viruses during the elimination phase.
Antivirus software developers assimilate defenses against viruses during the elimination phase.
Opening infected email attachments can lead to viral infections.
Opening infected email attachments can lead to viral infections.
Computer viruses use self-replication as a method of spreading.
Computer viruses use self-replication as a method of spreading.
A key difference between a virus and a worm is that a worm spreads automatically without attaching to other programs.
A key difference between a virus and a worm is that a worm spreads automatically without attaching to other programs.
Sniffing is a method used to capture data packets over a network.
Sniffing is a method used to capture data packets over a network.
Passive sniffing sends additional data packets to capture traffic.
Passive sniffing sends additional data packets to capture traffic.
Active sniffing is primarily used in switch-based networks.
Active sniffing is primarily used in switch-based networks.
In a hub-based network, only the host sending the data can capture the traffic.
In a hub-based network, only the host sending the data can capture the traffic.
MAC flooding is a technique used in active sniffing.
MAC flooding is a technique used in active sniffing.
A hacker can extract passwords from redirected traffic.
A hacker can extract passwords from redirected traffic.
Protocols like HTTPS are vulnerable to sniffing.
Protocols like HTTPS are vulnerable to sniffing.
Sniffers operate at the Data Link layer of the OSI model.
Sniffers operate at the Data Link layer of the OSI model.
A hardware protocol analyzer alters the traffic it captures.
A hardware protocol analyzer alters the traffic it captures.
Passwords and data sent in clear text are not susceptible to interception.
Passwords and data sent in clear text are not susceptible to interception.
Active wiretapping involves monitoring, recording, and altering communication traffic.
Active wiretapping involves monitoring, recording, and altering communication traffic.
Lawful interception requires consent from all parties involved in the communication.
Lawful interception requires consent from all parties involved in the communication.
Wiretapping is considered a criminal offense without a warrant in most countries.
Wiretapping is considered a criminal offense without a warrant in most countries.
PRISM is a tool designed specifically for domestic surveillance within the United States.
PRISM is a tool designed specifically for domestic surveillance within the United States.
A protocol analyzer allows attackers to view individual data bytes of data packets.
A protocol analyzer allows attackers to view individual data bytes of data packets.
Passive wiretapping can alter the traffic it monitors.
Passive wiretapping can alter the traffic it monitors.
The Keysight N2X N5540A is a type of protocol analyzer.
The Keysight N2X N5540A is a type of protocol analyzer.
The Access Switch/Tap is not part of the lawful interception process.
The Access Switch/Tap is not part of the lawful interception process.
Wiretapping requires the use of complex algorithms for basic monitoring tasks.
Wiretapping requires the use of complex algorithms for basic monitoring tasks.
The NSA utilizes PRISM to wiretap foreign internet traffic that passes through U.S. servers.
The NSA utilizes PRISM to wiretap foreign internet traffic that passes through U.S. servers.
In an offline attack, the attacker tries to crack passwords on their own system after copying the target's password file.
In an offline attack, the attacker tries to crack passwords on their own system after copying the target's password file.
A brute forcing attack attempts to guess a password using predefined dictionary words.
A brute forcing attack attempts to guess a password using predefined dictionary words.
Default passwords are typically supplied by the manufacturer with new equipment.
Default passwords are typically supplied by the manufacturer with new equipment.
A keylogger sends back user credentials to the attacker after infecting the victim's machine.
A keylogger sends back user credentials to the attacker after infecting the victim's machine.
Password guessing attacks have a high failure rate because the attacker guesses randomly.
Password guessing attacks have a high failure rate because the attacker guesses randomly.
A rainbow table is used to capture sensitive information like passwords from raw network traffic.
A rainbow table is used to capture sensitive information like passwords from raw network traffic.
In a replay attack, attackers capture packets and authentication tokens to gain access to a system.
In a replay attack, attackers capture packets and authentication tokens to gain access to a system.
Enabling information security audit can help monitor and track password attacks.
Enabling information security audit can help monitor and track password attacks.
The passive online attack known as Wire Sniffing is computationally complex and hard to perpetrate.
The passive online attack known as Wire Sniffing is computationally complex and hard to perpetrate.
Attacks that utilize cleartext protocols are more secure than those using strong encryption.
Attacks that utilize cleartext protocols are more secure than those using strong encryption.
Using a random string as a prefix or suffix with the password enhances security before encrypting it.
Using a random string as a prefix or suffix with the password enhances security before encrypting it.
Vertical privilege escalation involves acquiring the same level of privileges as another user.
Vertical privilege escalation involves acquiring the same level of privileges as another user.
Implementing multi-factor authentication can help defend against privilege escalation.
Implementing multi-factor authentication can help defend against privilege escalation.
Locking out an account after too many incorrect password guesses can prevent brute force attacks.
Locking out an account after too many incorrect password guesses can prevent brute force attacks.
Malicious applications executed during the attack phase are used to gather information and maintain access.
Malicious applications executed during the attack phase are used to gather information and maintain access.
Password cracking techniques are used to recover passwords from computer systems.
Password cracking techniques are used to recover passwords from computer systems.
Active online attacks involve the attacker communicating indirectly with the victim machine.
Active online attacks involve the attacker communicating indirectly with the victim machine.
Shoulder surfing is a type of non-electronic password attack.
Shoulder surfing is a type of non-electronic password attack.
Trojans can only be used for deleting files on a computer.
Trojans can only be used for deleting files on a computer.
Hiding files is a significant goal during the system hacking stage.
Hiding files is a significant goal during the system hacking stage.
Flashcards
Malware definition
Malware definition
Malicious software designed to harm or disable computer systems, potentially granting control to the creator for theft or fraud.
Trojan Horse
Trojan Horse
A type of malware disguised as legitimate software, often used to gain unauthorized access to a system.
Malware distribution methods
Malware distribution methods
Ways attackers spread malware, including exploiting software bugs, social engineering tricks, and compromised websites.
Trojan uses
Trojan uses
Signup and view all the flashcards
Trojan Infection Steps
Trojan Infection Steps
Signup and view all the flashcards
Trojan Wrapper
Trojan Wrapper
Signup and view all the flashcards
Command Shell Trojan
Command Shell Trojan
Signup and view all the flashcards
Remote Access Trojan
Remote Access Trojan
Signup and view all the flashcards
Botnet Trojan
Botnet Trojan
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Virus Characteristics
Virus Characteristics
Signup and view all the flashcards
Virus Life Cycle-Replication
Virus Life Cycle-Replication
Signup and view all the flashcards
Virus Life Cycle-Launch
Virus Life Cycle-Launch
Signup and view all the flashcards
Why Create Computer Viruses?
Why Create Computer Viruses?
Signup and view all the flashcards
Computer Worm
Computer Worm
Signup and view all the flashcards
Virus vs. Worm
Virus vs. Worm
Signup and view all the flashcards
Encryption Viruses
Encryption Viruses
Signup and view all the flashcards
Infection Methods
Infection Methods
Signup and view all the flashcards
Virus Replication
Virus Replication
Signup and view all the flashcards
Virus Removal
Virus Removal
Signup and view all the flashcards
Network Sniffing
Network Sniffing
Signup and view all the flashcards
Promiscuous Mode
Promiscuous Mode
Signup and view all the flashcards
Passive Sniffing
Passive Sniffing
Signup and view all the flashcards
Active Sniffing
Active Sniffing
Signup and view all the flashcards
ARP Poisoning
ARP Poisoning
Signup and view all the flashcards
Sniffing
Sniffing
Signup and view all the flashcards
Protocols Vulnerable to Sniffing
Protocols Vulnerable to Sniffing
Signup and view all the flashcards
Data Link Layer Sniffing
Data Link Layer Sniffing
Signup and view all the flashcards
Hardware Protocol Analyzer
Hardware Protocol Analyzer
Signup and view all the flashcards
How Sniffing Works
How Sniffing Works
Signup and view all the flashcards
Protocol Analyzer
Protocol Analyzer
Signup and view all the flashcards
Wiretapping
Wiretapping
Signup and view all the flashcards
Active Wiretapping
Active Wiretapping
Signup and view all the flashcards
Passive Wiretapping
Passive Wiretapping
Signup and view all the flashcards
Lawful Interception
Lawful Interception
Signup and view all the flashcards
PRISM
PRISM
Signup and view all the flashcards
What is the purpose of a protocol analyzer?
What is the purpose of a protocol analyzer?
Signup and view all the flashcards
What is the difference between active and passive wiretapping?
What is the difference between active and passive wiretapping?
Signup and view all the flashcards
Why is lawful interception necessary?
Why is lawful interception necessary?
Signup and view all the flashcards
What is the significance of the PRISM program?
What is the significance of the PRISM program?
Signup and view all the flashcards
Password Cracking Techniques
Password Cracking Techniques
Signup and view all the flashcards
Non-Electronic Password Attacks
Non-Electronic Password Attacks
Signup and view all the flashcards
Active Online Attacks
Active Online Attacks
Signup and view all the flashcards
Passive Online Attacks
Passive Online Attacks
Signup and view all the flashcards
Types of Password Attacks
Types of Password Attacks
Signup and view all the flashcards
Offline Attack
Offline Attack
Signup and view all the flashcards
Dictionary Attack
Dictionary Attack
Signup and view all the flashcards
Brute Forcing Attack
Brute Forcing Attack
Signup and view all the flashcards
Password Guessing
Password Guessing
Signup and view all the flashcards
Trojan/Spyware/Keylogger Attack
Trojan/Spyware/Keylogger Attack
Signup and view all the flashcards
Privilege Escalation
Privilege Escalation
Signup and view all the flashcards
Vertical Privilege Escalation
Vertical Privilege Escalation
Signup and view all the flashcards
Horizontal Privilege Escalation
Horizontal Privilege Escalation
Signup and view all the flashcards
Restricting Interactive Logon Privileges
Restricting Interactive Logon Privileges
Signup and view all the flashcards
Executing Malicious Applications
Executing Malicious Applications
Signup and view all the flashcards
USB Drive Attack
USB Drive Attack
Signup and view all the flashcards
Wire Sniffing
Wire Sniffing
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Rainbow Table Attack
Rainbow Table Attack
Signup and view all the flashcards
Password Change Policy
Password Change Policy
Signup and view all the flashcards
Study Notes
Malware Threats
- Malware is malicious software designed to damage or disable computer systems, granting the creator limited or full control for theft or fraud.
- Examples of malware include Trojan Horses, viruses, backdoors, worms, rootkits, spyware, ransomware, botnets, adware, and crypters.
Ways Malware Enters Systems
- Instant messaging applications (IRC, etc.)
- Browser and email software bugs
- Removable devices
- Attachments
- Legitimate "shrink-wrapped" software (disgruntled employee)
- NetBIOS (FileSharing)
- Fake programs
- Untrusted sites and freeware
- Downloading files, games, and screensavers from Internet sites
Malware Distribution Techniques
- Blackhat SEO: Ranking malware pages highly in search results.
- Social Engineering (Clickjacking): Tricking users into clicking on innocent-looking webpages.
- Malvertising: Embedding malware in ad networks displayed across many legitimate sites.
- Spearphishing Sites: Mimicking legitimate institutions to steal login credentials.
- Compromised Legitimate Websites: Hosting embedded malware that spreads to visitors.
- Drive-by Downloads: Exploiting browser flaws to install malware by visiting a webpage.
How Hackers Use Trojans
- Delete or replace critical operating system files.
- Disable firewalls and antivirus.
- Generate fake traffic to create DDoS attacks.
- Record screenshots, audio, and video of victim's PC.
- Use victim's PC for spamming, blasting email messages, and downloading malicious files.
- Create backdoors to gain remote access.
- Infect victim's PC as a proxy server for relaying attacks.
- Use victim's PC as a botnet to perform DDoS attacks.
- Steal information like passwords, security codes, credit cards using keyloggers.
How to Infect Systems Using a Trojan (Steps)
- Create a new Trojan packet using a Trojan Horse Construction Kit.
- Create a dropper, which installs malicious code on the target system.
- Create a wrapper using wrapper tools to install Trojan on the victim's computer.
- Propagate the Trojan.
- Execute the dropper.
- Execute the damage routine.
Wrappers
- Bind a Trojan executable with an innocent-looking .EXE application, like games or office programs.
- Installation happens in the background while the application runs in the foreground.
- Two programs are wrapped into a single file.
- Attackers might send a birthday greeting that installs a Trojan.
Command Shell Trojans
- Give remote control of a command shell.
- Trojan server installed on the victim's machine opens a port for attacker connection.
- The attacker's client machine launches a command shell on the victim's machine.
Remote Access Trojans (RATs)
- Trojan works like a remote desktop access program.
- Hacker gains complete GUI access to the remote system.
- An attacker can control the infected computer remotely.
Botnet Trojans
- Infect a large number of computers geographically to create a network of controllable "bots" (Command and Control Center).
- Botnet is used to launch various attacks like denial-of-service attacks, spamming, click fraud, and theft of financial information.
Evading Anti-Virus Techniques
- Break the Trojan file into multiple pieces and zip them as a single file.
- Write your own Trojan and embed it in an application.
- Change Trojan's syntax (e.g., convert EXE to VB script, change extensions).
- Change content using a hex editor, alter checksum, and encrypt the file.
- Never use Trojans downloaded from the web.
Introduction to Viruses
- Self-replicating programs that spread by attaching to programs, boot sectors, or documents.
- Typically spread via downloads, infected drives, or email attachments.
- Virus Characteristics: Infects other programs, alters data, transforms itself, corrupts files, and encrypts or replicates itself.
Stages of Virus Life Cycle
- Design (developing the virus code).
- Replication (virus replicates in the system).
- Launch (virus gets activated, runs the infected program).
- Detection (the virus is identified as a threat).
- Incorporation (antivirus software developers create defenses against the virus).
- Elimination (users install antivirus software to remove virus threats).
Why People Create Computer Viruses
- Inflict damage to competitors
- Financial benefits
- Research projects
- Play pranks
- Vandalism
- Distribute political messages
- Cyberterrorism
How a Computer Gets Infected by Viruses
- Accepting files/downloads without checking the source.
Encryption Viruses
- Encipher the code with a different key for each affected file.
- Difficult for antivirus scanners to directly detect due to encryption.
Computer Worms
- Malicious programs that replicate, execute, and spread across networks independently.
- Created to replicate and spread across a network; some carry payloads to damage the system.
- Attackers use worms to install backdoors (turning computers into zombies), creating botnets for further attacks.
Worms vs. Viruses
- Worms replicate independently, spreading through networks.
- Worms don't need to attach themselves to another program, while viruses do.
Anti-Virus Sensor Systems
- Collection of software detecting and analyzing malicious code threats (viruses, worms, Trojans).
How to Detect Trojans
- Scan for suspicious open ports, running processes, files/folders, registry entries, network activities, device drivers and Windows services.
- Use Trojan scanners.
Trojan Countermeasures
- Avoid opening email attachments from unknown senders.
- Install operating system and application patches/updates.
- Block unnecessary ports using a firewall.
- Avoid accepting programs from instant messaging.
- Harden default configuration settings.
- Monitor internal network traffic.
- Scan CDs/DVDs with antivirus software.
- Restrict permissions in the desktop and avoid blindly installing programs.
- Maintain local workstation file integrity.
- Avoid downloading from untrusted sources.
- Use host-based AV, firewall, and intrusion detection software.
Backdoor Countermeasures
- Use commercial antivirus (scans and detects backdoor programs).
- Educate users not to install apps from untrusted sources and attachments.
- Use anti-virus tools (e.g., McAfee, Norton).
Virus and Worm Countermeasures
- Install anti-virus software to prevent and remove infections.
- Be attentive when downloading and pay attention to instructions.
- Avoid opening unknown sender attachments.
- Create an antivirus policy.
- Update the anti-virus software regularly.
- Back up data regularly as viruses can corrupt it.
- Don't accept disks or programs without proper checking.
- Use currently updated anti-virus software.
Virus and Worms Countermeasures (Continued)
- Ensure executable codes sent to organization is approved.
- Avoid booting with infected bootable disks.
- Know about the latest virus threats.
- Check DVDs/CDs for virus infections.
- Use pop-up blockers and internet firewalls.
- Run disk cleanup, registry scanner, and defragmentation.
- Turn on firewall if using Windows XP.
- Run anti-spyware/adware.
- Don't open files with multiple extensions.
- Be cautious about files transmitted via instant messaging.
Anti-Virus Tools
- (A list of common anti-virus tools is) included.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.