Malware Threats and Entry Points

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Malware can only get into a system through removable devices.

False (B)

Social Engineered Click-jacking is a technique where users are tricked into clicking on seemingly harmless webpages.

True (A)

Drive-by Downloads require users to actively download malware from a website.

False (B)

A Trojan can be used to disable a computer's firewall and antivirus software.

<p>True (A)</p> Signup and view all the answers

Ransomware is a type of malware designed to record audio and video from a victim's computer.

<p>False (B)</p> Signup and view all the answers

A wrapper binds a Trojan executable with an innocent looking application, allowing it to install in the background while showing a fake interface.

<p>True (A)</p> Signup and view all the answers

Botnet Trojans can only infect computers within a localized area, limiting their reach.

<p>False (B)</p> Signup and view all the answers

Changing a Trojan's syntax, such as converting an EXE file to VB script, is a technique used to evade anti-virus detection.

<p>True (A)</p> Signup and view all the answers

A Remote Access Trojan allows an attacker to gain complete GUI access to a victim's machine.

<p>True (A)</p> Signup and view all the answers

Viruses are programs that require a user to run them in order to replicate and spread.

<p>True (A)</p> Signup and view all the answers

A virus cannot replicate itself without human interaction.

<p>True (A)</p> Signup and view all the answers

Encryption viruses can be detected directly using standard signature detection methods.

<p>False (B)</p> Signup and view all the answers

Computer worms require user interaction to spread across a network.

<p>False (B)</p> Signup and view all the answers

The incorporation stage of a virus life cycle involves the development of new variants of the virus.

<p>False (B)</p> Signup and view all the answers

Vandalism is one of the reasons people might create computer viruses.

<p>True (A)</p> Signup and view all the answers

Self-replication is a characteristic of computer viruses.

<p>True (A)</p> Signup and view all the answers

Installing pirated software can potentially lead to a computer being infected by viruses.

<p>True (A)</p> Signup and view all the answers

Computer worms can attach themselves to other programs like viruses do.

<p>False (B)</p> Signup and view all the answers

The launch stage of a virus' life cycle occurs when it is activated by the user.

<p>True (A)</p> Signup and view all the answers

Antivirus software can effectively eliminate all types of computer viruses without regular updates.

<p>False (B)</p> Signup and view all the answers

Passive sniffing requires the use of switches to capture all network traffic.

<p>False (B)</p> Signup and view all the answers

Active sniffing techniques can mislead a switch's Content Addressable Memory table.

<p>True (A)</p> Signup and view all the answers

In promiscuous mode, a network interface controller (NIC) can capture traffic intended for all devices on a network segment.

<p>True (A)</p> Signup and view all the answers

Modern networks primarily utilize hubs to send traffic to all connected devices.

<p>False (B)</p> Signup and view all the answers

Sniffing is simply the act of sending packets within a network to observe traffic patterns.

<p>False (B)</p> Signup and view all the answers

Protocols vulnerable to sniffing do not include HTTPS.

<p>True (A)</p> Signup and view all the answers

A hardware protocol analyzer is designed to change the network traffic it captures.

<p>False (B)</p> Signup and view all the answers

Sniffers can operate independently of the upper layers of the OSI model.

<p>True (A)</p> Signup and view all the answers

Keystrokes including user names and passwords are protected when transmitted over Telnet.

<p>False (B)</p> Signup and view all the answers

The initial compromise occurs at the Physical layer of the OSI model.

<p>False (B)</p> Signup and view all the answers

Active wiretapping only monitors and records the traffic without altering it.

<p>False (B)</p> Signup and view all the answers

Wiretapping without a warrant or consent is considered legal in most countries.

<p>False (B)</p> Signup and view all the answers

Lawful interception requires a court order for intercepting data communication.

<p>True (A)</p> Signup and view all the answers

Keysight N2X N5540A is classified as a protocol analyzer hardware.

<p>True (A)</p> Signup and view all the answers

PRISM is a tool designed for monitoring domestic data communication exclusively.

<p>False (B)</p> Signup and view all the answers

Passive wiretapping can alter the content of the communication being monitored.

<p>False (B)</p> Signup and view all the answers

The FLUKE Networks OptiView® XG Network Analyzer is one of the tools used for wiretapping.

<p>False (B)</p> Signup and view all the answers

An access switch/tap is used in lawful interception to monitor data communication.

<p>True (A)</p> Signup and view all the answers

Wiretapping can only be done for traditional telecommunications and not for VoIP.

<p>False (B)</p> Signup and view all the answers

The NSA uses PRISM to wiretap a large volume of domestic internet traffic.

<p>False (B)</p> Signup and view all the answers

A dictionary attack uses a file loaded with potential password combinations to crack user accounts.

<p>True (A)</p> Signup and view all the answers

Rainbow tables are an example of an online attack where the attacker cracks passwords in real-time on the victim's system.

<p>False (B)</p> Signup and view all the answers

Brute forcing attacks attempt every possible password combination until the correct one is found.

<p>True (A)</p> Signup and view all the answers

Default passwords are unique to each individual device and cannot be exploited by attackers.

<p>False (B)</p> Signup and view all the answers

Trojan, spyware, and keylogger attacks involve physically infecting a victim's machine without their knowledge.

<p>True (A)</p> Signup and view all the answers

Password cracking techniques are only used through electronic means.

<p>False (B)</p> Signup and view all the answers

Escalating privileges in system hacking refers to acquiring the rights of another user or an admin.

<p>True (A)</p> Signup and view all the answers

Covering tracks involves creating evidence of compromise.

<p>False (B)</p> Signup and view all the answers

Active online attacks require the attacker to communicate directly with the victim machine.

<p>True (A)</p> Signup and view all the answers

Rootkits are primarily used for password cracking.

<p>False (B)</p> Signup and view all the answers

In a replay attack, an attacker captures packets and authentication tokens and uses them later to gain access.

<p>True (A)</p> Signup and view all the answers

Rainbow table attacks make it extremely difficult to recover passwords from captured hashes.

<p>False (B)</p> Signup and view all the answers

Packet sniffing tools can only capture data over wireless networks.

<p>False (B)</p> Signup and view all the answers

Enabling information security audits is an effective measure against password attacks.

<p>True (A)</p> Signup and view all the answers

Man-in-the-Middle attacks are relatively easy to perpetrate as it does not require trust from any party.

<p>False (B)</p> Signup and view all the answers

Vertical privilege escalation involves assuming the identity of another user with the same privileges.

<p>False (B)</p> Signup and view all the answers

Using a strong password for SYSKEY is recommended to protect the SAM database.

<p>True (A)</p> Signup and view all the answers

Running users and applications on the least privileges is a method to prevent privilege escalation.

<p>True (A)</p> Signup and view all the answers

Monitoring logs for brute force attacks is unnecessary if accounts are locked after multiple incorrect guesses.

<p>False (B)</p> Signup and view all the answers

Encrypting sensitive data can protect it from unauthorized access during privilege escalation attacks.

<p>True (A)</p> Signup and view all the answers

Flashcards

Malware Definition

Malicious software designed to harm or disable computer systems, or give unauthorized control to the creator for theft or fraud.

Trojan Horse Function

A type of malware that disguises itself as harmless software, allowing hackers to gain unauthorized access and control over a computer system.

Malware Distribution Techniques

Methods used by hackers to spread malware, including malicious websites, compromised legitimate sites, and drive-by downloads.

Trojan's Effects

Trojans can delete critical files, disable security software, generate attacks, create backdoors, and steal information.

Signup and view all the flashcards

Malware Infection Methods

Malware can enter systems through various means, such as malicious links, infected attachments, or exploiting software vulnerabilities.

Signup and view all the flashcards

Trojan Wrapper

A Trojan that bundles itself with a legitimate application (like a game or office program).

Signup and view all the flashcards

Command Shell Trojan

A Trojan that gives remote access to a command prompt (shell) on the victim's computer.

Signup and view all the flashcards

Remote Access Trojan (RAT)

A Trojan that provides complete graphical user interface (GUI) access to a victim's computer from a remote location.

Signup and view all the flashcards

Botnet Trojan

A Trojan that infects many computers to form a network controlled by the attacker's Command and Control center.

Signup and view all the flashcards

Virus

A self-replicating program that attaches to other programs or system files, spreading copies of itself.

Signup and view all the flashcards

Virus Characteristic

A computer virus infects other programs, alters data, replicates, corrupts files, encrypts itself, and damages systems.

Signup and view all the flashcards

Virus Life Cycle (Stage 1)

Virus development using programming languages or special kits.

Signup and view all the flashcards

Virus Life Cycle (Stage 2)

Virus replicates within a system, then spreads to others.

Signup and view all the flashcards

Virus Life Cycle (Stage 3)

Virus activation triggered by user action (like opening a file).

Signup and view all the flashcards

Virus Life Cycle (Stage 4)

A virus is identified and recognized as a threat.

Signup and view all the flashcards

Virus Life Cycle (Stage 5)

Antivirus developers create defenses against the virus.

Signup and view all the flashcards

Virus Life Cycle (Stage 6)

Users install updates or antivirus software to remove the virus.

Signup and view all the flashcards

Malware Motivation (Example)

People create viruses for various reasons, including harming competitors, personal gain, research, pranks, vandalism, or political messages.

Signup and view all the flashcards

Computer Infection Ways

Computers get infected by opening suspicious email attachments, installing pirated software, ignoring updates, and not using the latest antivirus.

Signup and view all the flashcards

Encryption Virus Feature

Encryption viruses encrypt their code to avoid detection by antivirus software.

Signup and view all the flashcards

Sniffing

A network attack where an attacker intercepts and reads network traffic passing through a network, potentially capturing sensitive data like passwords and user credentials.

Signup and view all the flashcards

Protocols Vulnerable to Sniffing

Certain network protocols transmit data in plain text, making them susceptible to sniffing attacks. Examples include HTTP, Telnet, FTP, and POP3.

Signup and view all the flashcards

Data Link Layer Sniffing

Sniffers operate at the Data Link layer of the OSI model, capturing network traffic before it's processed by higher layers, making it invisible to the targeted application.

Signup and view all the flashcards

Hardware Protocol Analyzer

A specialized device that captures network traffic without altering it, allowing security professionals to monitor network activity and detect suspicious behavior.

Signup and view all the flashcards

What is a hardware protocol analyzer used for?

Hardware protocol analyzers are used to monitor network traffic and identify malicious network traffic generated by hacking software installed on the network.

Signup and view all the flashcards

What does sniffing involve?

Sniffing is the process of capturing and analyzing network traffic data packets. This is done by listening to all data passing through a specific network segment, often using sniffing tools.

Signup and view all the flashcards

What is promiscuous mode?

Promiscuous mode is a network interface card (NIC) setting that allows the card to capture all network traffic passing through it, not just the data intended for the device. It enables sniffing tools to capture all data packets, even those not directed at the sniffing device.

Signup and view all the flashcards

Passive Sniffing

Passive sniffing involves capturing network traffic without actively modifying or altering the network. It typically occurs on networks using hubs where all traffic is broadcast to every device connected.

Signup and view all the flashcards

Active Sniffing

Active sniffing involves actively manipulating network traffic to capture data. This often involves using techniques like ARP spoofing to redirect traffic through the attacker's device, allowing them to capture data packets not intended for their device.

Signup and view all the flashcards

ARP Poisoning

ARP poisoning is a technique used in active sniffing where an attacker sends false ARP messages to a network, to deceive other devices and cause them to send traffic through the attacker's device.

Signup and view all the flashcards

Protocol Analyzer

A device that captures data packets, decodes them, and analyzes their content based on predefined rules. It provides insights into network traffic, helping identify issues and potential security threats.

Signup and view all the flashcards

Wiretapping

Secretly monitoring and recording conversations or data transmissions between two parties without their knowledge or consent. It's an invasive method of gathering information and often illegal.

Signup and view all the flashcards

Active Wiretapping

Wiretapping that not only monitors and records communication but also modifies it or injects new data into the traffic flow.

Signup and view all the flashcards

Passive Wiretapping

Wiretapping that solely focuses on monitoring and recording communication without making any changes to it.

Signup and view all the flashcards

Lawful Interception

Legally authorized monitoring of communications data for surveillance purposes, usually involving court orders or requests for wiretaps.

Signup and view all the flashcards

PRISM

A data collection program designed to gather and analyze foreign intelligence data that passes through US servers, raising concerns about privacy and potential abuse.

Signup and view all the flashcards

Hardware Protocol Analyzer Example

A physical device used for analyzing network traffic, providing in-depth insights into the network's behavior and performance.

Signup and view all the flashcards

Wiretapping Case Study

A real-world example of how wiretapping techniques are used to monitor and collect data, potentially raising ethical and legal concerns.

Signup and view all the flashcards

Data Packet

A unit of data transmitted over a network, containing information about the sender, receiver, and the data itself.

Signup and view all the flashcards

Predetermined Rules

Specific criteria or patterns used to analyze data packets, helping to identify anomalies or interesting information.

Signup and view all the flashcards

Offline Attack (Password Cracking)

An attacker steals a target's password file and attempts to decipher passwords offline using various methods.

Signup and view all the flashcards

Rainbow Table

A pre-computed database of password hashes used to quickly crack passwords offline.

Signup and view all the flashcards

Dictionary Attack

An attack that uses a list of common words and phrases to guess passwords.

Signup and view all the flashcards

Brute Forcing Attack

An attack that tries every possible combination of characters until the correct password is found.

Signup and view all the flashcards

Password Guessing Attack

An attacker uses gathered information to create a list of potential passwords and tries them manually.

Signup and view all the flashcards

What is System Hacking?

The process of exploiting system vulnerabilities to gain unauthorized access, escalate privileges, execute malicious code, hide activities, and cover tracks.

Signup and view all the flashcards

Password Cracking

Techniques used to recover passwords from systems, often by trying multiple combinations until the correct one is found.

Signup and view all the flashcards

Types of Password Attacks

Different approaches to cracking passwords, categorized by attacker's method and communication with the target system.

Signup and view all the flashcards

Non-Electronic Attacks

Password cracking methods that don't involve computers, relying on social engineering or physical access.

Signup and view all the flashcards

Active Online Attacks

Password cracking techniques that involve direct communication with the target system, such as brute forcing or phishing.

Signup and view all the flashcards

USB Drive Attack

An attacker copies downloaded files to a USB drive, then uses the drive to execute a program (like PassView) that steals passwords and stores them in a .TXT file on the USB drive.

Signup and view all the flashcards

Wire Sniffing

A passive online attack where attackers use tools to capture and record network traffic, including sensitive information like passwords and emails.

Signup and view all the flashcards

Replay Attack

An attacker captures and records authentication tokens from network traffic. They then replay these tokens to gain unauthorized access.

Signup and view all the flashcards

Man-in-the-Middle (MITM) Attack

An attacker intercepts communication between a victim and a server, gaining access to the information being exchanged.

Signup and view all the flashcards

Rainbow Table Attack

An offline attack that uses a precomputed table of password hashes to quickly crack passwords by comparing captured password hashes with the table.

Signup and view all the flashcards

Privilege Escalation

An attacker gaining higher access privileges on a system, often exploiting vulnerabilities to gain administrative control.

Signup and view all the flashcards

Vertical Privilege Escalation

Gaining access to a higher level of privileges than the current user's, for example, going from a regular user to an administrator.

Signup and view all the flashcards

Horizontal Privilege Escalation

Gaining the same level of privileges but assuming the identity of another user with similar permissions.

Signup and view all the flashcards

Restrict Interactive Logons

Limiting direct user access to a system as a defence against privilege escalation.

Signup and view all the flashcards

Least Privilege Principle

Running users and applications with the minimum privileges necessary to perform their tasks, limiting potential damage if a system is compromised.

Signup and view all the flashcards

Study Notes

Malware Threats

  • Malware is malicious software damaging or disabling systems, giving the creator control for theft or fraud.
  • Examples include Trojan horses, viruses, backdoors, worms, rootkits, spyware, ransomware, botnets, adware, and crypters.

Malware Entry Points

  • Malware can enter systems via instant messenger applications (like IRC), removable devices, email attachments, malicious software disguised as legitimate software, browser/email bugs, NetBIOS (file-sharing), fake programs, untrusted websites/freeware, or downloads from internet sites.

Malware Distribution Techniques

  • Blackhat SEO: Ranking malware pages highly in search results.
  • Malvertising: Embedding malware in legitimate, high-traffic ad networks.
  • Spearphishing: Mimicking legitimate institutions to steal login credentials.
  • Compromised Websites: Hosting malware that spreads to visitors.
  • Drive-by Downloads: Exploiting browser flaws to install malware on web visits.

Trojan Horse Usage by Hackers

  • Trojans allow hackers to delete or replace critical system files.
  • They can disable firewalls and antivirus.
  • Trojans also generate fake traffic to create denial-of-service attacks (DoS).
  • Recording victim's screen activity, audio, and video is also possible.
  • Hackers use victim's PC for spamming and email blasting and malicious software downloads.
  • Information theft includes passwords, security codes, credit card data via keylogging.

Trojan Infections

  • Create a new Trojan packet via Trojan Horse Construction Kit.
  • Create a dropper to install malicious code on the target system.
  • Executable files or applications may be wrapped.
  • Trojans are installed on the victim's machine by a wrapper.
  • The trojan will propagate to other systems.
  • Execute the damage routine specified beforehand.

Wrappers

  • Bind a Trojan executable to an innocent-looking application (e.g., game, office app).
  • Install the Trojan in the background after the user runs the wrapped application.
  • Two programs can be wrapped into one file, creating confusion for users.
  • Attackers often send birthday greetings or other enticing elements inside the wrapped Trojan.

Command Shell Trojans

  • Provides remote control of a command shell on the victim's machine.
  • The Trojan server is installed, opening a port for the attacker's client to connect.
  • An attacker's client runs a command shell on the victim's machine to launch attacks.

Remote Access Trojans (RATs)

  • This Trojan allows complete remote desktop access.
  • Complete GUI control over the remote system is possible.
  • The attacker gains complete access once the reverse connection is established.
  • Typically employs a server.exe file to infect a system and establish a connection to the attacker.

Botnet Trojans

  • Infects numerous computers forming a botnet.
  • The botnet is controlled by a central command and control (C&C) server.
  • Launching attacks, like denial of service, spamming, click fraud, or financial data theft, are possible using botnets.

Evading Antivirus

  • Splitting the Trojan file into multiple pieces and zipping it.
  • Writing a customized Trojan and embedding it into an application.
  • Changing the Trojan's syntax (e.g., converting .EXE to VB script, changing extensions).
  • Modifying the Trojan's content using hex editors to change checksums and encrypt the file.
  • Avoid using Trojans downloaded from the web as antivirus can usually detect them.

Computer Viruses

  • Self-replicating programs that attach to other programs, boot sectors, or documents.
  • Common transmission methods include file downloads, infected media, and email attachments.
  • Virus characteristics include infecting other programs, altering data, corrupting files, transforming itself, encrypting itself, replicating itself.

Virus Life Cycle

  • Design: Virus code development.
  • Replication: Virus copies itself within the target system.
  • Launch: Triggered by user action.
  • Detection: Antivirus detects the virus.
  • Incorporation: Antivirus learns to fight against the virus and integrates defenses against it.
  • Elimination: Users remove the virus.

Reasons for Creating Viruses

  • Damage to competitors.
  • Financial gain.
  • Research projects.
  • Play pranks.
  • Vandalism.
  • Spreading political messages.
  • Cyber-terrorism.

Virus/Worm Infection

  • Acceptance of files that users downloaded without verifying the source.
  • Opening infected email attachments.
  • Installing pirated software.
  • Failure to update or install updated plug-ins.
  • Not having the latest antivirus application installed and running.

Encryption Viruses

  • Simple encryption encrypts code.
  • Different encryption keys for each infected file create detection challenges for antivirus software via signatures.

Computer Worms

  • Self-replicating programs but do not attach to other files.
  • Propagate via network connections independently.
  • Can spread quickly and consume network resources.
  • May include payload to damage the infected system.
  • Attackers create backdoors in infected computers to create zombie armies for further attacks.

Worm vs. Virus

  • Worms replicate independently, while viruses need hosts.
  • Worms leverage network features to spread; viruses usually attach to files.
  • Worms do not need to attach to other programs, whereas viruses often do.

Antivirus Sensor Systems

  • Detects and analyzes malicious threats (e.g., viruses, worms, Trojans).
  • Monitors network traffic, checking for malicious code.
  • Implements various detection mechanisms on different systems.

Detecting Trojans

  • Scan suspicious open ports.
  • Scan for suspicious startup programs.
  • Scan running processes.
  • Scan for suspicious files and folders.
  • Examine registry entries.
  • Monitor network activities.
  • Look for suspicious device drivers.
  • Check for Windows services.
  • Execute a Trojan scanner.

Trojan Countermeasures

  • Prevent opening email attachments from strangers.
  • Keep operating systems and applications updated.
  • Block unnecessary ports on firewalls.
  • Use strong and updated password practices.
  • Update virus detection software regularly.
  • Exercise caution when downloading and running applications.

Backdoor Countermeasures

  • Install and regularly update trusted antivirus products.
  • Educate users not to download or run programs from unknown sources.
  • Utilize robust antivirus tools to scan for and remove backdoors.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

System Hacking PDF
Malware Threats - Module 06 PDF
Sniffing - Module 07 PDF

More Like This

Cybersecurity: Phishing and Malware Types
40 questions
Malware Overview and Prevention
29 questions
Cybersecurity: Understanding Malware Types
13 questions
Use Quizgecko on...
Browser
Browser