Teardrop Attack in Computer Security

Teardrop Attack in Computer Security

Created by
@HumbleSatyr

Questions and Answers

What is the primary goal of a Teardrop Attack?

To crash or halt the system

What does the hacker send to the victim system in a Teardrop Attack?

A fragmented message

What happens to the victim system when it attempts to reconstruct the fragmented message?

It halts or crashes

What is the nature of the vulnerability exploited in a Teardrop Attack?

<p>Vulnerability in fragment reassembly code</p> Signup and view all the answers

What type of attack is a Teardrop Attack classified as?

<p>Denial-of-Service (DoS) attack</p> Signup and view all the answers

What is a characteristic of spyware?

<p>It is usually used for targets of choice.</p> Signup and view all the answers

What is an example of a form of spyware?

<p>Web cookies</p> Signup and view all the answers

What is a legal use of spyware?

<p>To monitor employees</p> Signup and view all the answers

What is a characteristic of rootkits?

<p>It is a collection of hacking tools.</p> Signup and view all the answers

What is a characteristic of malicious web-based code?

<p>It is portable on all operating systems.</p> Signup and view all the answers

How do antivirus software operate?

<p>By scanning for virus signatures and watching the behavior of executables</p> Signup and view all the answers

What is an example of anti-spyware software?

<p><a href="http://www.webroot.com">www.webroot.com</a></p> Signup and view all the answers

What is the purpose of keeping the signature file updated in antivirus software?

<p>To detect new viruses</p> Signup and view all the answers

What is a common way to avoid getting infected by viruses?

<p>Using a virus scanner</p> Signup and view all the answers

What can a Trojan horse do to a system?

<p>Download harmful software and install a key logger</p> Signup and view all the answers

What is the result of a buffer overflow attack?

<p>Valid data is overwritten and arbitrary code can be executed</p> Signup and view all the answers

Why should company policy prohibit unauthorized downloads?

<p>To avoid downloading Trojan horses</p> Signup and view all the answers

What is a characteristic of a competent programmer who crafts a Trojan horse?

<p>They can craft a Trojan horse to appeal to a certain person or demographic</p> Signup and view all the answers

What is the purpose of a code word for safe attachments from friends?

<p>To identify safe attachments from friends</p> Signup and view all the answers

What can a virus do to a system?

<p>Cause execution of arbitrary code</p> Signup and view all the answers

What is the result of writing data beyond the allocated end of a buffer?

<p>Valid data can be overwritten</p> Signup and view all the answers

What is a characteristic of a computer virus?

<p>It is a type of malware that self-replicates</p> Signup and view all the answers

How do viruses typically spread through a network?

<p>By finding a network connection and copying itself to other hosts</p> Signup and view all the answers

What is a common method of virus propagation through email?

<p>By sending itself to everyone in the host's address book</p> Signup and view all the answers

Why is Microsoft Outlook a popular target for viruses?

<p>Because it is easy to work with and can be programmed to send emails covertly</p> Signup and view all the answers

What is a type of malware that disguises itself as a legitimate program?

<p>Trojan horse</p> Signup and view all the answers

What is a buffer overflow attack?

<p>A type of attack that exploits a buffer overflow vulnerability</p> Signup and view all the answers

What is spyware?

<p>A type of malware that steals user data</p> Signup and view all the answers

What is the primary goal of defending against malware attacks?

<p>To prevent the spread of malware</p> Signup and view all the answers

Study Notes

Malware

  • Malware requires more technical knowledge and is usually used for targets of choice.
  • It must be tailored to specific circumstances and deployed.

Spyware

  • Forms of spyware include web cookies and key loggers.
  • Legal uses of spyware include monitoring children's computer use and employee monitoring.
  • Illegal uses of spyware involve covert deployment.
  • There are free spyware removal software available.

Other Forms of Malware

  • Rootkit is a collection of hacking tools that can:
    • Monitor traffic and keystrokes
    • Create a backdoor
    • Alter log files and existing tools to avoid detection
    • Attack other machines on the network

Malicious Web-Based Code

  • Web-based mobile code is portable on all operating systems and can spread quickly on the web.
  • Poorly scripted code can result in vulnerabilities.

Detecting and Eliminating Viruses and Spyware

  • Antivirus software operates in two ways:
    • Scans for virus signatures and keeps the signature file updated
    • Watches the behavior of executables, such as attempts to access email address book or change registry settings
  • Anti-spyware software is available from websites like webroot.com, spykiller.com, zerospy.com, and spectorsoft.com

Viruses

  • A computer virus self-replicates and spreads rapidly, and may or may not have a malicious payload.
  • Viruses can spread through:
    • Network connections
    • Email, using Microsoft Outlook or other email engines
    • Web site delivery, relying on end-user negligence
  • Multiple vectors for a virus are becoming more common.
  • Rules for avoiding viruses include:
    • Using a virus scanner
    • Not opening questionable attachments
    • Using a code word for safe attachments from friends
    • Not believing "Security Alerts"

Trojan Horses

  • A Trojan horse is a program that looks benign but is not, and can:
    • Download harmful software
    • Install a key logger
    • Open a back door for hackers
  • Company policy should prohibit unauthorized downloads.

The Buffer Overflow Attack

  • A buffer overflow attack occurs when a program writes data beyond the allocated end of a buffer, causing valid data to be overwritten.
  • This can cause execution of arbitrary (and potentially malicious) code.
  • A buffer overflow attack can be prevented by using security patches and keeping software up-to-date.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Tear Drop Scat Identification
12 questions
Use Quizgecko on...
Browser
Browser