CISSP Chapter 21: Malicious Code and Application Attacks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____________ techniques display advertisements on infected computers.

Adware

______________ are undocumented command sequences that allow individuals with knowledge of the backdoor to bypass normal access restrictions.

Backdoors

______________ vulnerabilities exist when a developer doesn't properly validate user input to ensure that it is of an appropriate size.

Buffer Overflow

What main 3 areas should anti-malware software be used on?

Client systems, server systems, and content filters that help read code for maliciousness

The ____________ worm ran across IIS web servers in 2011, probing IP addresses, defacing HTML pages, and planting logic bombs to initiate a DoS attack against the White House.

Code Red

_________________ attacks occur when web applications contain some type of reflected input. Typically done by inserting <SCRIPT> </SCRIPT> portions into input boxes. Defeated by input validation.

Cross site scripting (XSS)

____________ web applications can provide information specific to an individual user. They use a database to create content on demand when the user makes a request.

Dynamic

____________ viruses use cryptographic techniques to avoid detection. They use a virus decryption routing to load and decrypt the main virus code stored elsewhere on the disk. Also changes the signature of the virus.

Encrypted

_____________ is done after compromising/breaking in to a system to get more comprehensive, administrative/root access.

Escalation of privileges

In an _________________ attack, the malicious individual simply reconfigures their system so that it has the IP address of a trusted system and then attempts to gain access to other external resources.

IP spoofing

_____________ are one of the first attacks usually done against a network. Automated tools simply attempt to ping each address in a range. Systems that respond to the request are logged for further analysis.

IT probes/sweeps/ping sweeps

The ___________ worm exploited 4 holes in the Unix OS • Sendmail debug mode • Password attack • Finger vulnerability (determining who was logon on) • Trust relationships (to spread along trusted paths).

Internet

______________ are malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions such as time, program launch, website logon, and so on.

Logic bombs

____________ viruses propagate very quickly via macros in certain applications and infect things like documents.

Macro

_____________ are scripts that help automated repetitive tasks within an application.

Macros

______________ viruses use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other.

Multipartite

What are the 4 types of viruses that attempt to escape detection?

Multipartite viruses, stealth viruses, polymorphic viruses, encrypted viruses

___________ viruses actually modify their own code as they travel form system to system, changing the signature of the virus each time it infects a new system to fool antivirus software.

Polymorphic

___________ show what public services are running on each machine defined by an IT probe.

Port scans

___________________ infects a target machine and then uses encryption technology to encrypt documents, spreadsheets, and other files stored on the system with a key known only to the malware creator. They then ask for a ransom in exchange for the decryption key.

Ransomware

______________ are a common way of performing escalation of privilege attacks.

Rootkits

__________ attacks use unexpected input into web applications to gain unauthorized access to an underlying database.

SQL Injection

________________ viruses inject themselves into trusted runtime processes of the OS such as svchost.exe, winlogin.exe, and explorer.exe. By compromising these processes, the virus can avoid detection by antivirus software.

Service Injection

______________ occurs when a malicious individual intercepts part of the communication between an authorized user and a resource and then uses a technique to take over the session and assume the identity of the authorized user.

Session hijacking

________________ consists of tricking users for passwords with a call/email/etc. Typically rely on phishing emails now.

Social engineering

_____________ monitors your actions and transmits important details to a remote system that spies on your activity.

Spyware

___________ viruses hide themselves by actually tampering with the operating system to fool antivirus packages into thinking that everything is functioning normally.

Stealth

_____________ was a highly sophisticated worm that searched for unprotected administrative shares, exploited zero-day vulnerabilities, connected to systems using default database passwords, and spreading by the use of shared infected USB drives. Appeared in Iran to allegedly disrupt their nuclear program.

Stuxnet

What are the 2 main functions of a computer virus?

To propagate and destroy.

A _______________ is a software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network.

Trojan-horse

Rogueware and ransomware are what type of malicious software?

Trojan-horse

____________ produce reports about vulnerabilities on a system, letting attackers know where to attack.

Vulnerability scans

_____________ contain the same destructive potential as other malicious code but they propagate themselves without requiring any human intervention.

Worms

A variation of the file infector virus is the __________ virus. These viruses are self-contained executable files that escape detection by using a filename similar to, but slightly different from, a legit OS file.

companion

Many viruses infect different types of executables and trigger when the OS attempts to execute them. The propagation routines of _____________ viruses may slightly alter the code of an executable program, thereby implanting the technology the virus needs to replicate and damage the system. Sometimes the entire file is replaced with the infected version.

file infector

Many antivirus packages also use ___________-based mechanisms to detect potential malware infections. They analyze the behavior of software, looking for signs of virus activity, such as attempts to elevate privilege level, cover their electronic tracks, and alter unrelated or operating system files.

heuristic

The ____________ virus attacks the master boot record, which is the portion of bootable media (hard disk, USB drive, CD/DVD) that the computer uses to load the operating system during the boot process. These viruses store the majority of their code on another portion of the storage media. When the system reads the infected MBR, the virus instructs it to read and execute the code stored in this alternate location, thereby loading the entire virus into memory and potentially triggering the delivery of the payload.

master boot record (MBR)

There are ______________ based anti-virus software packages that protect against specific common types of virus invasion vectors. It keeps a database of known telltale characteristics of all known viruses and can scan/detect them.

signature

The ______________ issue is a timing vulnerability that occurs when a program checks access permissions too far in advance of a resource request.

time-of-check to time-of-use (TOC/TOU)

The computer _________ is the earliest form of malicious code and are highly prevalent.

virus


Ensembles d'études connexes

MNGT 301 Exam 3 (Ch. 11, 12, 14, 15)

View Set

Intro to Public Policy Final Exam

View Set