Podcast
Questions and Answers
Malware can only get into a system through removable devices.
Malware can only get into a system through removable devices.
False (B)
Social Engineered Click-jacking is a technique where users are tricked into clicking on seemingly harmless webpages.
Social Engineered Click-jacking is a technique where users are tricked into clicking on seemingly harmless webpages.
True (A)
Drive-by Downloads require users to actively download malware from a website.
Drive-by Downloads require users to actively download malware from a website.
False (B)
A Trojan can be used to disable a computer's firewall and antivirus software.
A Trojan can be used to disable a computer's firewall and antivirus software.
Ransomware is a type of malware designed to record audio and video from a victim's computer.
Ransomware is a type of malware designed to record audio and video from a victim's computer.
A wrapper binds a Trojan executable with an innocent looking application, allowing it to install in the background while showing a fake interface.
A wrapper binds a Trojan executable with an innocent looking application, allowing it to install in the background while showing a fake interface.
Botnet Trojans can only infect computers within a localized area, limiting their reach.
Botnet Trojans can only infect computers within a localized area, limiting their reach.
Changing a Trojan's syntax, such as converting an EXE file to VB script, is a technique used to evade anti-virus detection.
Changing a Trojan's syntax, such as converting an EXE file to VB script, is a technique used to evade anti-virus detection.
A Remote Access Trojan allows an attacker to gain complete GUI access to a victim's machine.
A Remote Access Trojan allows an attacker to gain complete GUI access to a victim's machine.
Viruses are programs that require a user to run them in order to replicate and spread.
Viruses are programs that require a user to run them in order to replicate and spread.
A virus cannot replicate itself without human interaction.
A virus cannot replicate itself without human interaction.
Encryption viruses can be detected directly using standard signature detection methods.
Encryption viruses can be detected directly using standard signature detection methods.
Computer worms require user interaction to spread across a network.
Computer worms require user interaction to spread across a network.
The incorporation stage of a virus life cycle involves the development of new variants of the virus.
The incorporation stage of a virus life cycle involves the development of new variants of the virus.
Vandalism is one of the reasons people might create computer viruses.
Vandalism is one of the reasons people might create computer viruses.
Self-replication is a characteristic of computer viruses.
Self-replication is a characteristic of computer viruses.
Installing pirated software can potentially lead to a computer being infected by viruses.
Installing pirated software can potentially lead to a computer being infected by viruses.
Computer worms can attach themselves to other programs like viruses do.
Computer worms can attach themselves to other programs like viruses do.
The launch stage of a virus' life cycle occurs when it is activated by the user.
The launch stage of a virus' life cycle occurs when it is activated by the user.
Antivirus software can effectively eliminate all types of computer viruses without regular updates.
Antivirus software can effectively eliminate all types of computer viruses without regular updates.
Passive sniffing requires the use of switches to capture all network traffic.
Passive sniffing requires the use of switches to capture all network traffic.
Active sniffing techniques can mislead a switch's Content Addressable Memory table.
Active sniffing techniques can mislead a switch's Content Addressable Memory table.
In promiscuous mode, a network interface controller (NIC) can capture traffic intended for all devices on a network segment.
In promiscuous mode, a network interface controller (NIC) can capture traffic intended for all devices on a network segment.
Modern networks primarily utilize hubs to send traffic to all connected devices.
Modern networks primarily utilize hubs to send traffic to all connected devices.
Sniffing is simply the act of sending packets within a network to observe traffic patterns.
Sniffing is simply the act of sending packets within a network to observe traffic patterns.
Protocols vulnerable to sniffing do not include HTTPS.
Protocols vulnerable to sniffing do not include HTTPS.
A hardware protocol analyzer is designed to change the network traffic it captures.
A hardware protocol analyzer is designed to change the network traffic it captures.
Sniffers can operate independently of the upper layers of the OSI model.
Sniffers can operate independently of the upper layers of the OSI model.
Keystrokes including user names and passwords are protected when transmitted over Telnet.
Keystrokes including user names and passwords are protected when transmitted over Telnet.
The initial compromise occurs at the Physical layer of the OSI model.
The initial compromise occurs at the Physical layer of the OSI model.
Active wiretapping only monitors and records the traffic without altering it.
Active wiretapping only monitors and records the traffic without altering it.
Wiretapping without a warrant or consent is considered legal in most countries.
Wiretapping without a warrant or consent is considered legal in most countries.
Lawful interception requires a court order for intercepting data communication.
Lawful interception requires a court order for intercepting data communication.
Keysight N2X N5540A is classified as a protocol analyzer hardware.
Keysight N2X N5540A is classified as a protocol analyzer hardware.
PRISM is a tool designed for monitoring domestic data communication exclusively.
PRISM is a tool designed for monitoring domestic data communication exclusively.
Passive wiretapping can alter the content of the communication being monitored.
Passive wiretapping can alter the content of the communication being monitored.
The FLUKE Networks OptiView® XG Network Analyzer is one of the tools used for wiretapping.
The FLUKE Networks OptiView® XG Network Analyzer is one of the tools used for wiretapping.
An access switch/tap is used in lawful interception to monitor data communication.
An access switch/tap is used in lawful interception to monitor data communication.
Wiretapping can only be done for traditional telecommunications and not for VoIP.
Wiretapping can only be done for traditional telecommunications and not for VoIP.
The NSA uses PRISM to wiretap a large volume of domestic internet traffic.
The NSA uses PRISM to wiretap a large volume of domestic internet traffic.
A dictionary attack uses a file loaded with potential password combinations to crack user accounts.
A dictionary attack uses a file loaded with potential password combinations to crack user accounts.
Rainbow tables are an example of an online attack where the attacker cracks passwords in real-time on the victim's system.
Rainbow tables are an example of an online attack where the attacker cracks passwords in real-time on the victim's system.
Brute forcing attacks attempt every possible password combination until the correct one is found.
Brute forcing attacks attempt every possible password combination until the correct one is found.
Default passwords are unique to each individual device and cannot be exploited by attackers.
Default passwords are unique to each individual device and cannot be exploited by attackers.
Trojan, spyware, and keylogger attacks involve physically infecting a victim's machine without their knowledge.
Trojan, spyware, and keylogger attacks involve physically infecting a victim's machine without their knowledge.
Password cracking techniques are only used through electronic means.
Password cracking techniques are only used through electronic means.
Escalating privileges in system hacking refers to acquiring the rights of another user or an admin.
Escalating privileges in system hacking refers to acquiring the rights of another user or an admin.
Covering tracks involves creating evidence of compromise.
Covering tracks involves creating evidence of compromise.
Active online attacks require the attacker to communicate directly with the victim machine.
Active online attacks require the attacker to communicate directly with the victim machine.
Rootkits are primarily used for password cracking.
Rootkits are primarily used for password cracking.
In a replay attack, an attacker captures packets and authentication tokens and uses them later to gain access.
In a replay attack, an attacker captures packets and authentication tokens and uses them later to gain access.
Rainbow table attacks make it extremely difficult to recover passwords from captured hashes.
Rainbow table attacks make it extremely difficult to recover passwords from captured hashes.
Packet sniffing tools can only capture data over wireless networks.
Packet sniffing tools can only capture data over wireless networks.
Enabling information security audits is an effective measure against password attacks.
Enabling information security audits is an effective measure against password attacks.
Man-in-the-Middle attacks are relatively easy to perpetrate as it does not require trust from any party.
Man-in-the-Middle attacks are relatively easy to perpetrate as it does not require trust from any party.
Vertical privilege escalation involves assuming the identity of another user with the same privileges.
Vertical privilege escalation involves assuming the identity of another user with the same privileges.
Using a strong password for SYSKEY is recommended to protect the SAM database.
Using a strong password for SYSKEY is recommended to protect the SAM database.
Running users and applications on the least privileges is a method to prevent privilege escalation.
Running users and applications on the least privileges is a method to prevent privilege escalation.
Monitoring logs for brute force attacks is unnecessary if accounts are locked after multiple incorrect guesses.
Monitoring logs for brute force attacks is unnecessary if accounts are locked after multiple incorrect guesses.
Encrypting sensitive data can protect it from unauthorized access during privilege escalation attacks.
Encrypting sensitive data can protect it from unauthorized access during privilege escalation attacks.
Flashcards
Malware Definition
Malware Definition
Malicious software designed to harm or disable computer systems, or give unauthorized control to the creator for theft or fraud.
Trojan Horse Function
Trojan Horse Function
A type of malware that disguises itself as harmless software, allowing hackers to gain unauthorized access and control over a computer system.
Malware Distribution Techniques
Malware Distribution Techniques
Methods used by hackers to spread malware, including malicious websites, compromised legitimate sites, and drive-by downloads.
Trojan's Effects
Trojan's Effects
Signup and view all the flashcards
Malware Infection Methods
Malware Infection Methods
Signup and view all the flashcards
Trojan Wrapper
Trojan Wrapper
Signup and view all the flashcards
Command Shell Trojan
Command Shell Trojan
Signup and view all the flashcards
Remote Access Trojan (RAT)
Remote Access Trojan (RAT)
Signup and view all the flashcards
Botnet Trojan
Botnet Trojan
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Virus Characteristic
Virus Characteristic
Signup and view all the flashcards
Virus Life Cycle (Stage 1)
Virus Life Cycle (Stage 1)
Signup and view all the flashcards
Virus Life Cycle (Stage 2)
Virus Life Cycle (Stage 2)
Signup and view all the flashcards
Virus Life Cycle (Stage 3)
Virus Life Cycle (Stage 3)
Signup and view all the flashcards
Virus Life Cycle (Stage 4)
Virus Life Cycle (Stage 4)
Signup and view all the flashcards
Virus Life Cycle (Stage 5)
Virus Life Cycle (Stage 5)
Signup and view all the flashcards
Virus Life Cycle (Stage 6)
Virus Life Cycle (Stage 6)
Signup and view all the flashcards
Malware Motivation (Example)
Malware Motivation (Example)
Signup and view all the flashcards
Computer Infection Ways
Computer Infection Ways
Signup and view all the flashcards
Encryption Virus Feature
Encryption Virus Feature
Signup and view all the flashcards
Sniffing
Sniffing
Signup and view all the flashcards
Protocols Vulnerable to Sniffing
Protocols Vulnerable to Sniffing
Signup and view all the flashcards
Data Link Layer Sniffing
Data Link Layer Sniffing
Signup and view all the flashcards
Hardware Protocol Analyzer
Hardware Protocol Analyzer
Signup and view all the flashcards
What is a hardware protocol analyzer used for?
What is a hardware protocol analyzer used for?
Signup and view all the flashcards
What does sniffing involve?
What does sniffing involve?
Signup and view all the flashcards
What is promiscuous mode?
What is promiscuous mode?
Signup and view all the flashcards
Passive Sniffing
Passive Sniffing
Signup and view all the flashcards
Active Sniffing
Active Sniffing
Signup and view all the flashcards
ARP Poisoning
ARP Poisoning
Signup and view all the flashcards
Protocol Analyzer
Protocol Analyzer
Signup and view all the flashcards
Wiretapping
Wiretapping
Signup and view all the flashcards
Active Wiretapping
Active Wiretapping
Signup and view all the flashcards
Passive Wiretapping
Passive Wiretapping
Signup and view all the flashcards
Lawful Interception
Lawful Interception
Signup and view all the flashcards
PRISM
PRISM
Signup and view all the flashcards
Hardware Protocol Analyzer Example
Hardware Protocol Analyzer Example
Signup and view all the flashcards
Wiretapping Case Study
Wiretapping Case Study
Signup and view all the flashcards
Data Packet
Data Packet
Signup and view all the flashcards
Predetermined Rules
Predetermined Rules
Signup and view all the flashcards
Offline Attack (Password Cracking)
Offline Attack (Password Cracking)
Signup and view all the flashcards
Rainbow Table
Rainbow Table
Signup and view all the flashcards
Dictionary Attack
Dictionary Attack
Signup and view all the flashcards
Brute Forcing Attack
Brute Forcing Attack
Signup and view all the flashcards
Password Guessing Attack
Password Guessing Attack
Signup and view all the flashcards
What is System Hacking?
What is System Hacking?
Signup and view all the flashcards
Password Cracking
Password Cracking
Signup and view all the flashcards
Types of Password Attacks
Types of Password Attacks
Signup and view all the flashcards
Non-Electronic Attacks
Non-Electronic Attacks
Signup and view all the flashcards
Active Online Attacks
Active Online Attacks
Signup and view all the flashcards
USB Drive Attack
USB Drive Attack
Signup and view all the flashcards
Wire Sniffing
Wire Sniffing
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Man-in-the-Middle (MITM) Attack
Man-in-the-Middle (MITM) Attack
Signup and view all the flashcards
Rainbow Table Attack
Rainbow Table Attack
Signup and view all the flashcards
Privilege Escalation
Privilege Escalation
Signup and view all the flashcards
Vertical Privilege Escalation
Vertical Privilege Escalation
Signup and view all the flashcards
Horizontal Privilege Escalation
Horizontal Privilege Escalation
Signup and view all the flashcards
Restrict Interactive Logons
Restrict Interactive Logons
Signup and view all the flashcards
Least Privilege Principle
Least Privilege Principle
Signup and view all the flashcards
Study Notes
Malware Threats
- Malware is malicious software damaging or disabling systems, giving the creator control for theft or fraud.
- Examples include Trojan horses, viruses, backdoors, worms, rootkits, spyware, ransomware, botnets, adware, and crypters.
Malware Entry Points
- Malware can enter systems via instant messenger applications (like IRC), removable devices, email attachments, malicious software disguised as legitimate software, browser/email bugs, NetBIOS (file-sharing), fake programs, untrusted websites/freeware, or downloads from internet sites.
Malware Distribution Techniques
- Blackhat SEO: Ranking malware pages highly in search results.
- Malvertising: Embedding malware in legitimate, high-traffic ad networks.
- Spearphishing: Mimicking legitimate institutions to steal login credentials.
- Compromised Websites: Hosting malware that spreads to visitors.
- Drive-by Downloads: Exploiting browser flaws to install malware on web visits.
Trojan Horse Usage by Hackers
- Trojans allow hackers to delete or replace critical system files.
- They can disable firewalls and antivirus.
- Trojans also generate fake traffic to create denial-of-service attacks (DoS).
- Recording victim's screen activity, audio, and video is also possible.
- Hackers use victim's PC for spamming and email blasting and malicious software downloads.
- Information theft includes passwords, security codes, credit card data via keylogging.
Trojan Infections
- Create a new Trojan packet via Trojan Horse Construction Kit.
- Create a dropper to install malicious code on the target system.
- Executable files or applications may be wrapped.
- Trojans are installed on the victim's machine by a wrapper.
- The trojan will propagate to other systems.
- Execute the damage routine specified beforehand.
Wrappers
- Bind a Trojan executable to an innocent-looking application (e.g., game, office app).
- Install the Trojan in the background after the user runs the wrapped application.
- Two programs can be wrapped into one file, creating confusion for users.
- Attackers often send birthday greetings or other enticing elements inside the wrapped Trojan.
Command Shell Trojans
- Provides remote control of a command shell on the victim's machine.
- The Trojan server is installed, opening a port for the attacker's client to connect.
- An attacker's client runs a command shell on the victim's machine to launch attacks.
Remote Access Trojans (RATs)
- This Trojan allows complete remote desktop access.
- Complete GUI control over the remote system is possible.
- The attacker gains complete access once the reverse connection is established.
- Typically employs a server.exe file to infect a system and establish a connection to the attacker.
Botnet Trojans
- Infects numerous computers forming a botnet.
- The botnet is controlled by a central command and control (C&C) server.
- Launching attacks, like denial of service, spamming, click fraud, or financial data theft, are possible using botnets.
Evading Antivirus
- Splitting the Trojan file into multiple pieces and zipping it.
- Writing a customized Trojan and embedding it into an application.
- Changing the Trojan's syntax (e.g., converting .EXE to VB script, changing extensions).
- Modifying the Trojan's content using hex editors to change checksums and encrypt the file.
- Avoid using Trojans downloaded from the web as antivirus can usually detect them.
Computer Viruses
- Self-replicating programs that attach to other programs, boot sectors, or documents.
- Common transmission methods include file downloads, infected media, and email attachments.
- Virus characteristics include infecting other programs, altering data, corrupting files, transforming itself, encrypting itself, replicating itself.
Virus Life Cycle
- Design: Virus code development.
- Replication: Virus copies itself within the target system.
- Launch: Triggered by user action.
- Detection: Antivirus detects the virus.
- Incorporation: Antivirus learns to fight against the virus and integrates defenses against it.
- Elimination: Users remove the virus.
Reasons for Creating Viruses
- Damage to competitors.
- Financial gain.
- Research projects.
- Play pranks.
- Vandalism.
- Spreading political messages.
- Cyber-terrorism.
Virus/Worm Infection
- Acceptance of files that users downloaded without verifying the source.
- Opening infected email attachments.
- Installing pirated software.
- Failure to update or install updated plug-ins.
- Not having the latest antivirus application installed and running.
Encryption Viruses
- Simple encryption encrypts code.
- Different encryption keys for each infected file create detection challenges for antivirus software via signatures.
Computer Worms
- Self-replicating programs but do not attach to other files.
- Propagate via network connections independently.
- Can spread quickly and consume network resources.
- May include payload to damage the infected system.
- Attackers create backdoors in infected computers to create zombie armies for further attacks.
Worm vs. Virus
- Worms replicate independently, while viruses need hosts.
- Worms leverage network features to spread; viruses usually attach to files.
- Worms do not need to attach to other programs, whereas viruses often do.
Antivirus Sensor Systems
- Detects and analyzes malicious threats (e.g., viruses, worms, Trojans).
- Monitors network traffic, checking for malicious code.
- Implements various detection mechanisms on different systems.
Detecting Trojans
- Scan suspicious open ports.
- Scan for suspicious startup programs.
- Scan running processes.
- Scan for suspicious files and folders.
- Examine registry entries.
- Monitor network activities.
- Look for suspicious device drivers.
- Check for Windows services.
- Execute a Trojan scanner.
Trojan Countermeasures
- Prevent opening email attachments from strangers.
- Keep operating systems and applications updated.
- Block unnecessary ports on firewalls.
- Use strong and updated password practices.
- Update virus detection software regularly.
- Exercise caution when downloading and running applications.
Backdoor Countermeasures
- Install and regularly update trusted antivirus products.
- Educate users not to download or run programs from unknown sources.
- Utilize robust antivirus tools to scan for and remove backdoors.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.