List some techniques used for propagation of malware
List some techniques used as payloads in malware
Explain what a “Worm” is, and how it works
Explain what a “Virus” is, and how it works
List the four phases of a typical “Virus”
- A typical virus goes through phases of: o Dormant o Propagation o Triggering o Execution
List the four components of a typical “virus”
o Infection mechanism – enables replication
o Modification engine – for disguise
o Trigger – event that makes payload activate
o Payload – what it does, malicious or benign
List some techniques a virus can use in order to hide itself
Explain how a “Naïve (simply self replicating) virus” can easily be found by virus protection software
A Naïve (simply self-replicating) virus can be detected by changing file size of infected programs
Explain how a (partially) compressed “virus” can be found by virus protection software
Explain how “Encrypted viruses” work
o Generate key o Encrypt virus body o Copy ♣ The bootstrap (decryption engine with key), and ♣ The encrypted virus body o When start ♣ Decrypt the virus body ♣ Execute
Explain how an “Encrypted Virus” can be found by virus protection software
We can look for program signature, and inspect if contents of program has changed
Briefly explain how “Polymorphic viruses” work
o Rebuild the whole virus at every infection to something functionally identical
♣ Either add non-functional code, or
♣ Re-order instructions
Briefly explain how a “Polymorphic Virus” can be found by virus protection software
o Focus on the decryption engine
Explain what a “Macro Virus” is, how it works, and some of its strengths
• Exploit macro/scripting capability of apps o Basic, Elisp, Javascript, … • Why: o Platform independent o Infects documents o Is easily spread
Give an example of an “E-mail Virus”, and how it works
• E.g. Melissa o Exploits MS Word Macro in attached doc o If attachment opened, macro activates o Sends email to all users in the address-book, and o does local damage
Explain what a “Trojan Horse” is, and how it works
Give some examples of “Integrity-loss”, and some causes for it
Give some examples of “Availability-loss”
- Physical integrity
Explain what a “Logic-Bomb” is, and how it works
Explain what a “Bot” is, and how it works
Give some examples of possible uses for “Bots”
o DDoS o Spamming o Manipulating on-line surveys o For using computational resources ♣ E.g. bit coin mining, password brute forcing o Cheating ad-providers o Spreading new malware
Give some examples of “Confidentiality-loss”
- Key loggers/pin loggers o Password theft - Spyware o Camera o Documents - Phishing - Espionage - Identity theft
Explain what “Backdoors” are, and how they work
Explain what “Rootkits” are, and how they work