Malware Threats and Entry Points
60 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Malware can only get into a system through removable devices.

False

Social Engineered Click-jacking is a technique where users are tricked into clicking on seemingly harmless webpages.

True

Drive-by Downloads require users to actively download malware from a website.

False

A Trojan can be used to disable a computer's firewall and antivirus software.

<p>True</p> Signup and view all the answers

Ransomware is a type of malware designed to record audio and video from a victim's computer.

<p>False</p> Signup and view all the answers

A wrapper binds a Trojan executable with an innocent looking application, allowing it to install in the background while showing a fake interface.

<p>True</p> Signup and view all the answers

Botnet Trojans can only infect computers within a localized area, limiting their reach.

<p>False</p> Signup and view all the answers

Changing a Trojan's syntax, such as converting an EXE file to VB script, is a technique used to evade anti-virus detection.

<p>True</p> Signup and view all the answers

A Remote Access Trojan allows an attacker to gain complete GUI access to a victim's machine.

<p>True</p> Signup and view all the answers

Viruses are programs that require a user to run them in order to replicate and spread.

<p>True</p> Signup and view all the answers

A virus cannot replicate itself without human interaction.

<p>True</p> Signup and view all the answers

Encryption viruses can be detected directly using standard signature detection methods.

<p>False</p> Signup and view all the answers

Computer worms require user interaction to spread across a network.

<p>False</p> Signup and view all the answers

The incorporation stage of a virus life cycle involves the development of new variants of the virus.

<p>False</p> Signup and view all the answers

Vandalism is one of the reasons people might create computer viruses.

<p>True</p> Signup and view all the answers

Self-replication is a characteristic of computer viruses.

<p>True</p> Signup and view all the answers

Installing pirated software can potentially lead to a computer being infected by viruses.

<p>True</p> Signup and view all the answers

Computer worms can attach themselves to other programs like viruses do.

<p>False</p> Signup and view all the answers

The launch stage of a virus' life cycle occurs when it is activated by the user.

<p>True</p> Signup and view all the answers

Antivirus software can effectively eliminate all types of computer viruses without regular updates.

<p>False</p> Signup and view all the answers

Passive sniffing requires the use of switches to capture all network traffic.

<p>False</p> Signup and view all the answers

Active sniffing techniques can mislead a switch's Content Addressable Memory table.

<p>True</p> Signup and view all the answers

In promiscuous mode, a network interface controller (NIC) can capture traffic intended for all devices on a network segment.

<p>True</p> Signup and view all the answers

Modern networks primarily utilize hubs to send traffic to all connected devices.

<p>False</p> Signup and view all the answers

Sniffing is simply the act of sending packets within a network to observe traffic patterns.

<p>False</p> Signup and view all the answers

Protocols vulnerable to sniffing do not include HTTPS.

<p>True</p> Signup and view all the answers

A hardware protocol analyzer is designed to change the network traffic it captures.

<p>False</p> Signup and view all the answers

Sniffers can operate independently of the upper layers of the OSI model.

<p>True</p> Signup and view all the answers

Keystrokes including user names and passwords are protected when transmitted over Telnet.

<p>False</p> Signup and view all the answers

The initial compromise occurs at the Physical layer of the OSI model.

<p>False</p> Signup and view all the answers

Active wiretapping only monitors and records the traffic without altering it.

<p>False</p> Signup and view all the answers

Wiretapping without a warrant or consent is considered legal in most countries.

<p>False</p> Signup and view all the answers

Lawful interception requires a court order for intercepting data communication.

<p>True</p> Signup and view all the answers

Keysight N2X N5540A is classified as a protocol analyzer hardware.

<p>True</p> Signup and view all the answers

PRISM is a tool designed for monitoring domestic data communication exclusively.

<p>False</p> Signup and view all the answers

Passive wiretapping can alter the content of the communication being monitored.

<p>False</p> Signup and view all the answers

The FLUKE Networks OptiView® XG Network Analyzer is one of the tools used for wiretapping.

<p>False</p> Signup and view all the answers

An access switch/tap is used in lawful interception to monitor data communication.

<p>True</p> Signup and view all the answers

Wiretapping can only be done for traditional telecommunications and not for VoIP.

<p>False</p> Signup and view all the answers

The NSA uses PRISM to wiretap a large volume of domestic internet traffic.

<p>False</p> Signup and view all the answers

A dictionary attack uses a file loaded with potential password combinations to crack user accounts.

<p>True</p> Signup and view all the answers

Rainbow tables are an example of an online attack where the attacker cracks passwords in real-time on the victim's system.

<p>False</p> Signup and view all the answers

Brute forcing attacks attempt every possible password combination until the correct one is found.

<p>True</p> Signup and view all the answers

Default passwords are unique to each individual device and cannot be exploited by attackers.

<p>False</p> Signup and view all the answers

Trojan, spyware, and keylogger attacks involve physically infecting a victim's machine without their knowledge.

<p>True</p> Signup and view all the answers

Password cracking techniques are only used through electronic means.

<p>False</p> Signup and view all the answers

Escalating privileges in system hacking refers to acquiring the rights of another user or an admin.

<p>True</p> Signup and view all the answers

Covering tracks involves creating evidence of compromise.

<p>False</p> Signup and view all the answers

Active online attacks require the attacker to communicate directly with the victim machine.

<p>True</p> Signup and view all the answers

Rootkits are primarily used for password cracking.

<p>False</p> Signup and view all the answers

In a replay attack, an attacker captures packets and authentication tokens and uses them later to gain access.

<p>True</p> Signup and view all the answers

Rainbow table attacks make it extremely difficult to recover passwords from captured hashes.

<p>False</p> Signup and view all the answers

Packet sniffing tools can only capture data over wireless networks.

<p>False</p> Signup and view all the answers

Enabling information security audits is an effective measure against password attacks.

<p>True</p> Signup and view all the answers

Man-in-the-Middle attacks are relatively easy to perpetrate as it does not require trust from any party.

<p>False</p> Signup and view all the answers

Vertical privilege escalation involves assuming the identity of another user with the same privileges.

<p>False</p> Signup and view all the answers

Using a strong password for SYSKEY is recommended to protect the SAM database.

<p>True</p> Signup and view all the answers

Running users and applications on the least privileges is a method to prevent privilege escalation.

<p>True</p> Signup and view all the answers

Monitoring logs for brute force attacks is unnecessary if accounts are locked after multiple incorrect guesses.

<p>False</p> Signup and view all the answers

Encrypting sensitive data can protect it from unauthorized access during privilege escalation attacks.

<p>True</p> Signup and view all the answers

Study Notes

Malware Threats

  • Malware is malicious software damaging or disabling systems, giving the creator control for theft or fraud.
  • Examples include Trojan horses, viruses, backdoors, worms, rootkits, spyware, ransomware, botnets, adware, and crypters.

Malware Entry Points

  • Malware can enter systems via instant messenger applications (like IRC), removable devices, email attachments, malicious software disguised as legitimate software, browser/email bugs, NetBIOS (file-sharing), fake programs, untrusted websites/freeware, or downloads from internet sites.

Malware Distribution Techniques

  • Blackhat SEO: Ranking malware pages highly in search results.
  • Malvertising: Embedding malware in legitimate, high-traffic ad networks.
  • Spearphishing: Mimicking legitimate institutions to steal login credentials.
  • Compromised Websites: Hosting malware that spreads to visitors.
  • Drive-by Downloads: Exploiting browser flaws to install malware on web visits.

Trojan Horse Usage by Hackers

  • Trojans allow hackers to delete or replace critical system files.
  • They can disable firewalls and antivirus.
  • Trojans also generate fake traffic to create denial-of-service attacks (DoS).
  • Recording victim's screen activity, audio, and video is also possible.
  • Hackers use victim's PC for spamming and email blasting and malicious software downloads.
  • Information theft includes passwords, security codes, credit card data via keylogging.

Trojan Infections

  • Create a new Trojan packet via Trojan Horse Construction Kit.
  • Create a dropper to install malicious code on the target system.
  • Executable files or applications may be wrapped.
  • Trojans are installed on the victim's machine by a wrapper.
  • The trojan will propagate to other systems.
  • Execute the damage routine specified beforehand.

Wrappers

  • Bind a Trojan executable to an innocent-looking application (e.g., game, office app).
  • Install the Trojan in the background after the user runs the wrapped application.
  • Two programs can be wrapped into one file, creating confusion for users.
  • Attackers often send birthday greetings or other enticing elements inside the wrapped Trojan.

Command Shell Trojans

  • Provides remote control of a command shell on the victim's machine.
  • The Trojan server is installed, opening a port for the attacker's client to connect.
  • An attacker's client runs a command shell on the victim's machine to launch attacks.

Remote Access Trojans (RATs)

  • This Trojan allows complete remote desktop access.
  • Complete GUI control over the remote system is possible.
  • The attacker gains complete access once the reverse connection is established.
  • Typically employs a server.exe file to infect a system and establish a connection to the attacker.

Botnet Trojans

  • Infects numerous computers forming a botnet.
  • The botnet is controlled by a central command and control (C&C) server.
  • Launching attacks, like denial of service, spamming, click fraud, or financial data theft, are possible using botnets.

Evading Antivirus

  • Splitting the Trojan file into multiple pieces and zipping it.
  • Writing a customized Trojan and embedding it into an application.
  • Changing the Trojan's syntax (e.g., converting .EXE to VB script, changing extensions).
  • Modifying the Trojan's content using hex editors to change checksums and encrypt the file.
  • Avoid using Trojans downloaded from the web as antivirus can usually detect them.

Computer Viruses

  • Self-replicating programs that attach to other programs, boot sectors, or documents.
  • Common transmission methods include file downloads, infected media, and email attachments.
  • Virus characteristics include infecting other programs, altering data, corrupting files, transforming itself, encrypting itself, replicating itself.

Virus Life Cycle

  • Design: Virus code development.
  • Replication: Virus copies itself within the target system.
  • Launch: Triggered by user action.
  • Detection: Antivirus detects the virus.
  • Incorporation: Antivirus learns to fight against the virus and integrates defenses against it.
  • Elimination: Users remove the virus.

Reasons for Creating Viruses

  • Damage to competitors.
  • Financial gain.
  • Research projects.
  • Play pranks.
  • Vandalism.
  • Spreading political messages.
  • Cyber-terrorism.

Virus/Worm Infection

  • Acceptance of files that users downloaded without verifying the source.
  • Opening infected email attachments.
  • Installing pirated software.
  • Failure to update or install updated plug-ins.
  • Not having the latest antivirus application installed and running.

Encryption Viruses

  • Simple encryption encrypts code.
  • Different encryption keys for each infected file create detection challenges for antivirus software via signatures.

Computer Worms

  • Self-replicating programs but do not attach to other files.
  • Propagate via network connections independently.
  • Can spread quickly and consume network resources.
  • May include payload to damage the infected system.
  • Attackers create backdoors in infected computers to create zombie armies for further attacks.

Worm vs. Virus

  • Worms replicate independently, while viruses need hosts.
  • Worms leverage network features to spread; viruses usually attach to files.
  • Worms do not need to attach to other programs, whereas viruses often do.

Antivirus Sensor Systems

  • Detects and analyzes malicious threats (e.g., viruses, worms, Trojans).
  • Monitors network traffic, checking for malicious code.
  • Implements various detection mechanisms on different systems.

Detecting Trojans

  • Scan suspicious open ports.
  • Scan for suspicious startup programs.
  • Scan running processes.
  • Scan for suspicious files and folders.
  • Examine registry entries.
  • Monitor network activities.
  • Look for suspicious device drivers.
  • Check for Windows services.
  • Execute a Trojan scanner.

Trojan Countermeasures

  • Prevent opening email attachments from strangers.
  • Keep operating systems and applications updated.
  • Block unnecessary ports on firewalls.
  • Use strong and updated password practices.
  • Update virus detection software regularly.
  • Exercise caution when downloading and running applications.

Backdoor Countermeasures

  • Install and regularly update trusted antivirus products.
  • Educate users not to download or run programs from unknown sources.
  • Utilize robust antivirus tools to scan for and remove backdoors.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

System Hacking PDF
Malware Threats - Module 06 PDF
Sniffing - Module 07 PDF

Description

This quiz covers the various types of malware, their entry points, and distribution techniques. Learn how malware can affect systems and the methods used by cybercriminals to infiltrate networks. Test your knowledge on recognizing and preventing these threats.

More Like This

Types of Malicious Software (Malware)
5 questions
Cybersecurity: Phishing and Malware Types
40 questions
Types of Malware Quiz
10 questions

Types of Malware Quiz

AdventurousMarigold avatar
AdventurousMarigold
Types of Malware Quiz
9 questions

Types of Malware Quiz

WorthEmpowerment1870 avatar
WorthEmpowerment1870
Use Quizgecko on...
Browser
Browser