Rootkits Flashcards

(12 cards)

1
Q

What is a Rootkit?

A

Designed to gain administrative level control over a given computer system without being detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Administrative account do?

A

Allows the person to install programs, delete programs, open ports, shut ports, and do whatever it is they want to do on that system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a technique used by Rootkits to gain a deeper level of access on computer systems?

A

DLL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Dynamic Link Library (DLL)?

A

Collection of code and data that can be used by multiple programs simultaneously to allow for code reuse and modularization in software development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DLL Injection?

A

Technique used to run arbitrary code within the address space of another process by forcing it to load an infected dynamic-link library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Shim?

A

Piece of software code that is placed between two components and that intercepts the calls between those components and can be used to redirect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different rings of permission throughout a computer system?

A

Ring 0, Ring 1, Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Ring 3 (Outermost Ring)?

A

Where user level permissions are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Ring 1?

A

You login as the administrator or root user on a system, you have root permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ring 0 (Innermost or Highest Permission Level)?

A

This is Kernal mode, which allows a system to control access to things like device drivers, your sound card, your video display or monitor, and other similar things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Rootkit do once installed on a system?

A

It tries to move from Ring 1 to Ring 0 so that it can hide from other functions of the operating system to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you detect a Rootkit?

A

The best way is to boot from an external device and then scan the internal hard drive to ensure that you can detect those rootkits using a good anti-malware scanning solution from a live boot Linux distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly