Trojan Horses (4.3) – Flashcards
17 test answers
Unlock all answers in this set
Unlock answers 17question
Back Orfice
answer
At first looked like a good way to do remote logins, but once installed it would open a backdoor to steal information.
Unlock the answer
question
Mocmex (2008)
answer
Distributed through Chinese-made digital photo frames. Once the frame was opened in order to render a picture, it began collecting and transmitting passwords.
Unlock the answer
question
Computer Worms
answer
A malware program that spreads copies of itself without the need to inject itself in other programs, and usually without human interaction.
Unlock the answer
question
Morris Worm
answer
written by Cornell student Robert Tappan Morris and released on November 2, 1988. The worm copied itself onto other computers and did no actual damage, but caused a denial-of-service attack. He was the first person convicted under the 1986 Computer Fraud and Abuse Act.
Unlock the answer
question
Worm Development
answer
-Identify vulnerability still unpatched.
-Write code exploitation of vulnerability, generation of target list, installation and execution of payload.
-Initial deployment on botnet
-Worm template
-Distributed graph search algorithm
Unlock the answer
question
Rootkit
answer
A clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence.
modifies the operating system or system utility programs to hide its existence: designed to hide the fact that an OS has been compromised
Unlock the answer
question
What can a rootkit do?
answer
• A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it.
• Has the ability to remotely execute files and change system configurations on the host machine.
• Can also access log files and spy on the legitimate computer owner's usage.
Unlock the answer
question
Rootkit detection and removal
answer
hard to detect
Often looks for behavioral-based methods (e.g., looking for strange behavior on a computer system), signature scanning, difference scanning, and memory
dump analysis.
Removal can be complicated (especially in kernel)
Unlock the answer
question
Rootkit Prevention
answer
• Systems need to be current with patches against know vulnerabilities such as OS, applications, and up-to-date virus definitions.
• Do not open email file attachments or accept files from unknown sources.
• Use static analyzers to scan software.
Unlock the answer
question
Zero-Day Attacks
answer
Refer to software vulnerabilities that have been found in-the-wild before security researchers and software developers become aware of the threat.
Unlock the answer
question
Botnet
answer
-A generic name given to any collection of compromised PCs controlled by an attacker remote.
-Comes from the words robot and network.
Unlock the answer
question
"Bots" or "Zombies"
answer
A machine that is controlled (commonly by botnet) externally to perform malicious attacks are often called this
Unlock the answer
question
Uses of Botnets
answer
-DDoS attacks (rely on computing power and bandwidth of hundreds or thousands of PCs)
-Spammers use them to send millions of emials
-Cybercriminals use them in large-scale credit-card fraud
Unlock the answer