click below
click below
Normal Size Small Size show me how
CIT294 Chapter 5
CIT294 Ethical Hacking Chapter 5: Malware Terms
Question | Answer |
---|---|
backdoor | a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time. |
Trojan | a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. Can cause data theft and loss, system crashes and slowdowns. |
Remote Access Trojans (RATs) | are class of backdoors used to enable remote control. Behaves like executable file and always have a client and server file. |
overt channel | is the normal and a legitimate way that programs communicate within a computer system or network. |
covert channel | uses programs or communications paths in ways that were not intended. Trojans use covert channels to communicate undetected! |
Remote Access Trojans (RATs) | used to gain remote access to a system |
Data-Sending Trojans | used to find data on a system and deliver data to a hacker |
Destructive Trojans | used to delete or corrupt files on a system |
Denial of Service Trojans | used to launch a denial or service attack |
Proxy Trojans | used to tunnel traffic or launch hacking attacks via other system |
FTP Trojans | used to create an FTP server in order to copy files onto a system |
Security software disabler Trojans | used to stop antivirus software |
NetCat | is a trojan that uses a command line interface to open TCP or UDP ports on a target. Hacker can then telnet to those open ports and gain shell access to the target system. Must run on both a client and a server. |
Wrappers | software packages that can be used to deliver a Trojan. It binds a legitimate file to the Trojan file as a single executable and is installed when the program is run. |
Windows File Protection (WFP) | prevents the replacement of protected files that include SYS, DLL, OCX, TTF, or EXE files. This ensures that only Microsoft-verified files are used to replace system files. |
sigverif | Windows tool that checks to see what files Microsoft has digitally signed on a system. To run, click Start Run and type in sigverif and click start. |
System File Checker | command line tool that can be used to check whether a Trojan program has replaced files. If SFC detects that file has been overwritten, it retrieve a known good file from Windows\system32\dllcache folder and overwrites the unverified file. |
virus | infects another executable and uses this carrier program to spread itself. The virus code is injected into the previously benign program and is spread when the program is run. |
worm | is a type of virus, but it’s self-replicating. A worm spreads from system to system automatically, but a virus needs another program in order to spread. |
What do viruses infect? | System sectors, Files, Macros (such as Microsoft Word macros), Companion files (supporting system files like DLL and INI files), Disk clusters, Batch files (BAT files), and Source code |
Polymorphic viruses | encrypt the code in a different way with each infection. |
Stealth viruses | hide the normal virus characteristics. |
Fast and slow infectors | evade detection by infecting very quickly or very slowly. |
Sparse infectors | infect only a few systems or applications. |
Armored viruses | are encrypted to prevent detection. |
Multipartite viruses | create multiple infections. |
Cavity (space filler) viruses | attach to empty areas of files. |
Tunneling viruses | are sent via a different protocol or encrypted. |
Camouflage viruses | appear to be another program. |
NTFS and Active Directory viruses | attack the NT file system or Active Directory on Windows systems. |
virus detection techniques | Scanning, Integrity checking with checksums, Interception based on a virus signature |